AustralianCyberSecurityCentre / ism-oscalLinks
A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.
☆36Updated 3 months ago
Alternatives and similar repositories for ism-oscal
Users that are interested in ism-oscal are comparing it to the libraries listed below
Sorting:
- ☆46Updated 2 years ago
- Discover for Cloud and Containers Azure☆29Updated 5 months ago
- A Secure Controls Framework (SCF) Power BI App☆21Updated 8 months ago
- WA Cyber Security Unit (DGOV Technical) site☆37Updated this week
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 10 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆53Updated 3 months ago
- Controls Assessment Specification☆70Updated 3 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆42Updated 3 years ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆44Updated 5 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Updated 2 weeks ago
- A web application to streamline the development of STIGs from SRGs☆76Updated last week
- NIST 800-53 Baseline Configuration Tool☆13Updated 10 months ago
- Tools for the OSCAL project☆37Updated 2 years ago
- ☆72Updated 10 months ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆140Updated this week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆41Updated 3 years ago
- Compliance Scorecard OSCAL Policy Standards☆18Updated last year
- ☆18Updated 3 years ago
- Testing Azure ARM / Image Builder and DSC to establish STIG'd resource☆38Updated last year
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆229Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆156Updated this week
- Security Control Knowledge Graph☆29Updated last year
- A ComplianceAsCode blog☆27Updated 2 months ago
- Website for ASD's Blueprint for Secure Cloud☆86Updated 2 weeks ago
- Cloud threat detection visualization from excalidraw☆12Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Various deployments of the OSCAL editor☆46Updated 11 months ago
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago