Comcast / xCOMPASSLinks
This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.
☆31Updated 3 weeks ago
Alternatives and similar repositories for xCOMPASS
Users that are interested in xCOMPASS are comparing it to the libraries listed below
Sorting:
- ☆83Updated 8 months ago
- An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.☆20Updated 2 months ago
- The Elevation of Privilege Threat Modeling Game☆332Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆53Updated 3 months ago
- ☆116Updated last week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆51Updated last week
- Stakeholder-Specific Vulnerability Categorization☆155Updated this week
- Repository for the Open Information Security Risk Universe☆64Updated 3 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆164Updated 10 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆173Updated 7 months ago
- OWASP Foundation Web Respository☆24Updated this week
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Updated 2 weeks ago
- OWASP Foundation Threat Dragon Project Web Repository☆82Updated 2 weeks ago
- Privacy Engineering Collaboration Space☆262Updated last year
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆168Updated 3 weeks ago
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- Continuous Audit Metrics☆27Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆162Updated 2 years ago
- Cryptography Bill of Materials☆69Updated 5 months ago
- Core model including reused documentation☆98Updated last month
- Privacy Cards for Software Developers☆53Updated 6 years ago
- Practical Library Of Threats 4 Artificial Intelligence☆28Updated 3 weeks ago
- Software Component Verification Standard (SCVS)☆148Updated 3 months ago
- This repository contains resources to support organizations’ use of the Privacy Framework. Resources include crosswalks, Profiles, guidel…☆55Updated 11 months ago
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆185Updated last year
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago
- App that simplifies building decision trees to model adverse scenarios☆215Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago