Ask-Sage / NIST-800-53-Automation
This python app generates NIST 800 53 control implementation for each control and generate the CSV file.
☆46Updated last year
Alternatives and similar repositories for NIST-800-53-Automation:
Users that are interested in NIST-800-53-Automation are comparing it to the libraries listed below
- Demo setup for compliance-trestle☆33Updated last month
- NIST OSCAL SDK and CLI☆19Updated 9 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- Security Control Knowledge Graph☆28Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last month
- ☆15Updated 3 years ago
- Posture Attribute Collection and Evaluation☆23Updated last year
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- ☆16Updated 11 months ago
- Tools for the OSCAL project☆36Updated 2 years ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated 2 months ago
- This repository is a collection of resources to help facilitate compliance innovation utilizing Cloud, DevSecOps and Software Factory tec…☆71Updated last year
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆39Updated 3 months ago
- NIST SP 800-171 OSCAL Content☆13Updated 2 years ago
- ☆21Updated 9 months ago
- A web application to streamline the development of STIGs from SRGs☆74Updated last month
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆40Updated 3 weeks ago
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆58Updated last year
- Automate vulnerability triage which prioritizes remediation over discovery☆16Updated this week
- ☆41Updated 2 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 5 months ago
- Global Security Database Tools☆42Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Automatically generated diagrams for OSCAL models☆18Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆58Updated last week