GovReady / security-stories-nist800-53View external linksLinks
A collection of security related user stories compatible with NIST Special Publication 800-53
☆37Mar 14, 2017Updated 8 years ago
Alternatives and similar repositories for security-stories-nist800-53
Users that are interested in security-stories-nist800-53 are comparing it to the libraries listed below
Sorting:
- Pulled the H-1 Table from the NIST SP 800-53 Rev. 4. Table maps applicable NIST controls to the ISO/IEC 27001 Controls☆20Aug 5, 2019Updated 6 years ago
- Prototype of making fisma 800-53 controls interactive☆27Nov 8, 2020Updated 5 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Oct 30, 2025Updated 3 months ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 2 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data☆27May 22, 2019Updated 6 years ago
- Key risk indicator (KRI) for risk management and business strategy☆29Apr 14, 2025Updated 10 months ago
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆23Jul 8, 2016Updated 9 years ago
- An open source, self-service GRC tool to automate security assessments and compliance.☆204Dec 10, 2024Updated last year
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- Open Security Controls Assessment Language (OSCAL)☆849Updated this week
- OpenControl-formatted industry standards and requirement documents☆47Aug 28, 2023Updated 2 years ago
- Nutritionix iOS library for communication with Nutritionix API service☆11Jun 10, 2014Updated 11 years ago
- This repository contains the compiled Arduino Due sketch for emulating a Diesel Exhaust Fluid (DEF) head.☆13May 18, 2022Updated 3 years ago
- Interactive CD dependency diagram☆28Oct 31, 2025Updated 3 months ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 2 months ago
- ☆13Nov 5, 2024Updated last year
- A Kubernetes operator for managing NATS decentralized authentication resources.☆31Updated this week
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆12Nov 14, 2023Updated 2 years ago
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 2 months ago
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- Epidemiological surveillance in Python☆10Mar 20, 2024Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- problem sets for CS-GY 6903 Applied Cryptography☆41Dec 15, 2021Updated 4 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Dec 21, 2023Updated 2 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- AWS Signer Plugin for Notation☆18Jan 26, 2026Updated 3 weeks ago
- ☆11Apr 8, 2021Updated 4 years ago
- Therapy for Your Code — Decode Your Repository's Mind!☆13Oct 29, 2023Updated 2 years ago
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 2 years ago
- The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality …☆15Updated this week
- Taws - A personal and private web search engine☆24Feb 20, 2015Updated 10 years ago
- ☆12Sep 6, 2024Updated last year
- Documentation generator for the Go programming language☆11Apr 21, 2011Updated 14 years ago
- 🔑🔐☁️ Cloudformation custom resource that enables creation of KMS encrypted strings and SSM secure parameters☆13Jul 9, 2020Updated 5 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 3 years ago
- Cloud security documents and tools to assist with conducting risk assessments that conform to the ICS62443 guidelines☆10Apr 24, 2023Updated 2 years ago
- Batch scripts for signing and getting cert keys on Windows.☆26Jan 23, 2014Updated 12 years ago