AustralianCyberSecurityCentre / ism-oscal
A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.
☆17Updated last month
Related projects ⓘ
Alternatives and complementary repositories for ism-oscal
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 4 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆36Updated 3 months ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆42Updated 2 months ago
- Various deployments of the OSCAL editor☆47Updated 3 months ago
- ☆43Updated last year
- Automatically generated diagrams for OSCAL models☆16Updated 2 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last year
- Tools for the OSCAL project☆34Updated last year
- Controls Assessment Specification☆65Updated 5 months ago
- ☆18Updated 4 months ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆139Updated 4 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 7 months ago
- Docker build of GovReady☆13Updated last year
- ☆9Updated 11 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated last month
- MITRE ATT&CK Based App in Power BI☆12Updated 8 months ago
- Open Security Controls Assessment Language Toolbox☆10Updated this week
- ☆16Updated 3 years ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 weeks ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆44Updated 11 months ago
- Security Control Knowledge Graph☆26Updated 6 months ago
- ☆36Updated last year
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆70Updated 2 weeks ago
- A ComplianceAsCode blog☆25Updated last week
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated 10 months ago
- Scripts to import OSCAL example content into the Neo4J graph database☆27Updated last year
- NIST SP 800-53 Rev 5 as Data☆23Updated 4 years ago
- An ACAS/SCAP/CKL scan parser and report generator☆23Updated 3 years ago
- ☆14Updated 2 years ago