A collection of security related user stories compatible with NIST Special Publication 800-53
☆38Mar 14, 2017Updated 8 years ago
Alternatives and similar repositories for security-stories-nist800-53
Users that are interested in security-stories-nist800-53 are comparing it to the libraries listed below
Sorting:
- Pulled the H-1 Table from the NIST SP 800-53 Rev. 4. Table maps applicable NIST controls to the ISO/IEC 27001 Controls☆20Aug 5, 2019Updated 6 years ago
- NIST SP 800-53 Rev 5 as Data☆25Apr 4, 2020Updated 5 years ago
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- Contacts Synchronization Private Directory Public Directory City Search Profession Search☆11Oct 21, 2017Updated 8 years ago
- ☆22Jul 12, 2024Updated last year
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Feb 25, 2026Updated last week
- Key risk indicator (KRI) for risk management and business strategy☆29Apr 14, 2025Updated 10 months ago
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆23Jul 8, 2016Updated 9 years ago
- cloud.gov security policies and procedures☆27Updated this week
- Security Documentation Builder☆374Feb 16, 2026Updated 3 weeks ago
- ICS Security Labs☆38Mar 27, 2021Updated 4 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Open Security Controls Assessment Language (OSCAL)☆853Updated this week
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 3 months ago
- Interactive CD dependency diagram☆29Feb 15, 2026Updated 3 weeks ago
- Epidemiological surveillance in Python☆11Mar 20, 2024Updated last year
- A collection of React components and hooks☆14Mar 3, 2025Updated last year
- Index and Search Your Private PDF Collection☆18Jan 16, 2016Updated 10 years ago
- A Kubernetes operator for managing NATS decentralized authentication resources.☆32Updated this week
- The CSET, Malcom, Con-PCA suite of tools☆13Mar 7, 2023Updated 3 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Continuous Security on AWS Workshop (CSOA) published by Pearson☆11Aug 14, 2022Updated 3 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 3 years ago
- A fork of APIviz with out of the box support for classes compiled with Java 8.☆10Apr 15, 2018Updated 7 years ago
- The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality …☆15Updated this week
- Custom rules for the Powershell Script Analyzer☆10Mar 26, 2020Updated 5 years ago
- Taws - A personal and private web search engine☆24Feb 20, 2015Updated 11 years ago
- Tool to check AWS S3 bucket permissions☆12Oct 26, 2017Updated 8 years ago
- ☆12Sep 6, 2024Updated last year
- 🔑🔐☁️ Cloudformation custom resource that enables creation of KMS encrypted strings and SSM secure parameters☆13Jul 9, 2020Updated 5 years ago
- AWS Signer Plugin for Notation☆18Mar 2, 2026Updated last week
- This plugin can be used to extract a WordPress website and generate android app using cordova and phonegap☆10Aug 18, 2014Updated 11 years ago
- Manage the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning.☆13Jul 16, 2025Updated 7 months ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Documentation generator for the Go programming language☆11Apr 21, 2011Updated 14 years ago
- Proof of Concept framework for generating EC2 Image Builder pipelines☆10Feb 5, 2022Updated 4 years ago
- ☆11Apr 8, 2021Updated 4 years ago