GoogleCloudPlatform / security-analytics
Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud
☆324Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for security-analytics
- Take automated actions against threats and vulnerabilities.☆210Updated last year
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆100Updated last year
- GCP CIS 1.1.0 Benchmark InSpec Profile☆129Updated 3 months ago
- Collection of YARA-L 2.0 sample rules for the Chronicle Detection API☆316Updated 3 weeks ago
- Built-in Panther detection rules and policies☆338Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆380Updated 7 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆175Updated 3 months ago
- Open Cloud Security Posture Management Engine☆333Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆175Updated 2 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆308Updated last week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆257Updated 9 months ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆27Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆210Updated 2 years ago
- ☆363Updated 8 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆266Updated 2 months ago
- ☆26Updated last month
- Documenting your Threat Models with HCL☆400Updated 2 months ago
- ☆354Updated 6 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆319Updated 10 months ago
- GCP Auto Remediation Suite for High Risk Events☆42Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆57Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆181Updated 11 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆341Updated 6 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 5 months ago
- Python samples and utilities for Chronicle APIs☆77Updated this week
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆141Updated 11 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆96Updated 10 months ago
- PCS Policies Release Notice☆110Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆364Updated last year
- Prisma Cloud docs☆80Updated 7 months ago