Ask-Sage / NIST-800-53-AutomationLinks
This python app generates NIST 800 53 control implementation for each control and generate the CSV file.
☆48Updated last year
Alternatives and similar repositories for NIST-800-53-Automation
Users that are interested in NIST-800-53-Automation are comparing it to the libraries listed below
Sorting:
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆39Updated 3 weeks ago
- NIST OSCAL SDK and CLI☆19Updated this week
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 8 months ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆43Updated 3 weeks ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated last week
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 9 months ago
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- Tool for obfuscating and deobfuscating data.☆70Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆52Updated 2 months ago
- https://breaches.cloud☆39Updated 7 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- ☆15Updated 3 years ago
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆59Updated last year
- Security Control Knowledge Graph☆28Updated last year
- Add a layer of active defense to your cloud applications.☆92Updated last week
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated 2 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 7 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Various deployments of the OSCAL editor☆46Updated 10 months ago
- A ComplianceAsCode blog☆27Updated last month
- Cross cloud workload identity research and workshops☆38Updated last month
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- Manage a uniform team of security managers for every organization in your enterprise☆17Updated 9 months ago
- ☆16Updated 2 years ago
- ☆41Updated 3 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year