CISecurity / ControlsAssessmentSpecificationLinks
Controls Assessment Specification
☆70Updated 4 months ago
Alternatives and similar repositories for ControlsAssessmentSpecification
Users that are interested in ControlsAssessmentSpecification are comparing it to the libraries listed below
Sorting:
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆125Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- A curated list of awesome things related to TheHive & Cortex☆183Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- ☆133Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- ☆48Updated 2 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆55Updated 4 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆44Updated 5 years ago
- ☆96Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆54Updated 5 months ago
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆233Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆185Updated last year
- Collaborative Open Playbook Standard☆157Updated 2 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆494Updated last year
- OSSEM Common Data Model☆56Updated 2 years ago
- ☆119Updated last year
- Building environments to replicate small networks and deploy applications☆326Updated 7 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- A python package for use in generating fake data for SOC and security automation.☆170Updated 5 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated last month
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago