Arudjreis / awesome-security-GRCLinks
Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).
☆739Updated 2 months ago
Alternatives and similar repositories for awesome-security-GRC
Users that are interested in awesome-security-GRC are comparing it to the libraries listed below
Sorting:
- Open source templates you can use to bootstrap your security programs☆859Updated last month
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆129Updated last month
- A concise, directive, specific, flexible, and free incident response plan template☆718Updated last year
- Useful templates and working document for implementing ISO 27001 - ISMS☆167Updated 2 months ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆625Updated last month
- CISSP and CCSP study material repository. ISC2.☆324Updated 9 months ago
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆579Updated last week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,011Updated 2 weeks ago
- A curated list of annual cyber security reports☆568Updated last week
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆238Updated last week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,449Updated 3 weeks ago
- ☆10Updated last year
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆362Updated 6 months ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆679Updated 9 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- This is a companion to the Security Engineer Questions☆203Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆493Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,569Updated 11 months ago
- SOC Interview Questions☆1,170Updated 10 months ago
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆777Updated last month
- Playbooks for SOC Analysts☆543Updated 2 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆435Updated last month
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆97Updated 4 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆385Updated last year
- Cyber Incident Response Team Playbook Battle Cards☆382Updated last year
- In depth guide for cybersecurity interviews☆144Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,188Updated 3 weeks ago
- CISSP Resources☆686Updated last month