CISecurity / ControlsAssessmentSpecification
Controls Assessment Specification
☆70Updated last month
Alternatives and similar repositories for ControlsAssessmentSpecification
Users that are interested in ControlsAssessmentSpecification are comparing it to the libraries listed below
Sorting:
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- NIST CyberSecurity Framework management tool☆163Updated 3 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- ☆131Updated last year
- ☆54Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 11 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆50Updated last month
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆150Updated this week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- ☆118Updated last year
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- ☆83Updated 2 months ago
- OWASP Foundation Web Respository☆23Updated 2 months ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆386Updated last year
- Discover for Cloud and Containers Azure☆29Updated 3 months ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆28Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- ☆44Updated 2 years ago