CISecurity / ControlsAssessmentSpecification
Controls Assessment Specification
☆69Updated 3 weeks ago
Alternatives and similar repositories for ControlsAssessmentSpecification:
Users that are interested in ControlsAssessmentSpecification are comparing it to the libraries listed below
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last month
- ☆131Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆54Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 11 months ago
- NIST CyberSecurity Framework management tool☆162Updated 3 years ago
- OWASP Foundation Web Respository☆23Updated 2 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆82Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 5 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆149Updated this week
- ☆44Updated 2 years ago
- ☆118Updated last year
- Cybersecurity Incident Response Plan☆90Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆178Updated 3 years ago
- ☆93Updated 2 years ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆75Updated 3 weeks ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated last month
- OSSEM Common Data Model☆55Updated 2 years ago