CISecurity / ControlsAssessmentSpecificationLinks
Controls Assessment Specification
☆70Updated 2 months ago
Alternatives and similar repositories for ControlsAssessmentSpecification
Users that are interested in ControlsAssessmentSpecification are comparing it to the libraries listed below
Sorting:
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 7 months ago
- ☆54Updated 3 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- NIST CyberSecurity Framework management tool☆165Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆52Updated 2 months ago
- ☆131Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆44Updated 2 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- Cybersecurity Incident Response Plan☆91Updated 4 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- ☆95Updated 2 years ago
- OWASP Foundation Web Respository☆23Updated 3 months ago
- ☆118Updated last year
- Elastic Beat for fetching and shipping Office 365 audit events☆67Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Discover for Cloud and Containers Azure☆29Updated 4 months ago
- ☆83Updated 2 months ago
- ☆44Updated 2 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆40Updated 2 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆152Updated this week
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆220Updated 4 months ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆79Updated last week