CISecurity / ControlsAssessmentSpecification
Controls Assessment Specification
☆65Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for ControlsAssessmentSpecification
- Documentation on the Cyber Defense Matrix☆24Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last year
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated last month
- The Infosec Community Definitive Guide to Jupyter Notebooks☆115Updated 4 years ago
- ☆53Updated 3 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆133Updated this week
- ☆131Updated 8 months ago
- NIST CyberSecurity Framework management tool☆157Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 weeks ago
- ☆43Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆41Updated 3 weeks ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated 10 months ago
- ☆114Updated last year
- MITRE ATT&CK Based App in Power BI☆12Updated 8 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 4 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆145Updated last week
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- ☆87Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆92Updated 2 years ago
- OWASP Foundation Web Respository☆22Updated last year
- Recon Hunt Queries☆75Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆42Updated 2 weeks ago
- Cloud security tutorials and best practices☆38Updated last year
- ☆18Updated 4 months ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- ☆41Updated 2 years ago