Comcast / ProjectGuardRail
AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications should meet during their design phase that serve as guardrails against these threats. These requirements help scope the threats such applications must be protected against.
☆24Updated last month
Related projects ⓘ
Alternatives and complementary repositories for ProjectGuardRail
- OWASP Foundation Web Respository☆27Updated last year
- AI featured threat modeling and security review action☆40Updated this week
- InfoSec OpenAI Examples☆19Updated 11 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 7 months ago
- ☆99Updated 5 months ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆28Updated 10 months ago
- LLM Testing Findings Templates☆65Updated 9 months ago
- ☆37Updated 7 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆18Updated last month
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆17Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- ☆30Updated 2 years ago
- AI featured threat modeling and security review project☆12Updated this week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆48Updated this week
- ☆185Updated this week
- Threat Modeling Manifesto☆27Updated 4 months ago
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆12Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 2 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆42Updated 2 weeks ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆25Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Data Scientists Go To Jupyter☆57Updated this week
- OWASP Foundation Web Respository☆27Updated 3 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆22Updated 2 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆27Updated last month