Elevated-Standards / proof-of-concept-cloud-evidence-collectionLinks
Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.
β11Updated last year
Alternatives and similar repositories for proof-of-concept-cloud-evidence-collection
Users that are interested in proof-of-concept-cloud-evidence-collection are comparing it to the libraries listed below
Sorting:
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionalsβ23Updated 4 years ago
- π€ A GitHub action that leverages fabric patterns through an agent-based approachβ32Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysisβ24Updated 11 months ago
- A fun POC that is built to understand AI security agents.β34Updated 2 months ago
- A meta-database collecting resources that compile lists of breachesβ21Updated 2 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secuβ¦β51Updated 4 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β73Updated last year
- β31Updated this week
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abouβ¦β60Updated 3 years ago
- ATHI β An AI Threat Modeling Framework for Policymakersβ59Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.β18Updated 4 years ago
- β20Updated 9 months ago
- Short deep dive into Threat Hunting on AWSβ15Updated 2 years ago
- Workflows for Shuffleβ24Updated 3 years ago
- Technical Tabletop Exercises Simulation Frameworkβ48Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.β54Updated last month
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.β177Updated last month
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering inβ¦β31Updated 5 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.β117Updated 2 weeks ago
- β44Updated 2 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β68Updated 6 months ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threaβ¦β18Updated 5 years ago
- Template SOC2 Policy Authority - documentation pipelineβ138Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.β33Updated 3 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, β¦β45Updated 4 years ago
- Security Control Knowledge Graphβ31Updated last year
- Open-source Fabric templates for cybersecurity and complianceβ28Updated 11 months ago
- This is a repository to experiment with MCP for securityβ45Updated 11 months ago
- β19Updated 3 years ago
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formatsβ22Updated 2 weeks ago