Comcast / xCOMPASS
This repository hosts a persona based privacy threat modeling solution called Models of Applied Privacy or MAP.
☆31Updated 5 months ago
Alternatives and similar repositories for xCOMPASS:
Users that are interested in xCOMPASS are comparing it to the libraries listed below
- This repository contains resources to support organizations’ use of the Privacy Framework. Resources include crosswalks, Profiles, guidel…☆53Updated 9 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last month
- ☆100Updated 3 weeks ago
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- An AI-Powered Privacy Threat Modeling tool based on the LINDDUN framework by leveraging Large Language Models.☆16Updated 2 weeks ago
- Automatically generated diagrams for OSCAL models☆18Updated 3 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆39Updated 3 months ago
- ☆16Updated 11 months ago
- Various deployments of the OSCAL editor☆46Updated 8 months ago
- ☆16Updated last year
- Controls Assessment Specification☆69Updated 3 weeks ago
- Stakeholder-Specific Vulnerability Categorization☆146Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 5 months ago
- AI/ML applications have unique security threats. Project GuardRail is a set of security and privacy requirements that AI/ML applications …☆28Updated 3 months ago
- Privacy Engineering Collaboration Space☆260Updated 11 months ago
- Tools for the OSCAL project☆36Updated 2 years ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆163Updated this week
- Continuous Audit Metrics☆26Updated 10 months ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Cryptography Bill of Materials☆67Updated 2 months ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- ☆77Updated 6 months ago
- OCSF Documentation☆129Updated 2 months ago
- Repository for on-going work as part of the AIBOM Tiger Team effort.☆20Updated 7 months ago
- Software Component Verification Standard (SCVS)☆143Updated 3 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated this week
- ☆22Updated 3 weeks ago
- Awesome Privacy Engineering☆60Updated last year
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆181Updated last year