IDPros / bokLinks
This is a public comment environment for the IDPro body of knowledge.
☆74Updated 4 months ago
Alternatives and similar repositories for bok
Users that are interested in bok are comparing it to the libraries listed below
Sorting:
- Collaboration on the table of contents for IDPro Body of Knowledge☆20Updated 2 years ago
- Minimum guardrails for GC's cloud operationalization framework.☆99Updated 9 months ago
- A simple way to deploy SailPoint's IdentityIQ into a series of docker containers mimicking the core components of most development enviro…☆49Updated 4 years ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆176Updated 2 months ago
- NIST SP 800-53 content and other OSCAL content examples☆377Updated 2 weeks ago
- Various deployments of the OSCAL editor☆46Updated last year
- Example demonstrating how to customize PingDirectory, PingFederate and PingAccess Docker containers by applying configuration files☆60Updated 2 weeks ago
- FedRAMP Automation☆343Updated 5 months ago
- Threats Manager Platform Core libraries and SDK☆75Updated 5 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆256Updated this week
- Rapidly apply hundreds of security controls in Azure☆184Updated 4 months ago
- OpenID Shared Signals Working Group Repository☆65Updated 2 weeks ago
- Website for ASD's Blueprint for Secure Cloud☆90Updated last week
- OCSF Documentation☆139Updated 3 months ago
- Discover for Cloud and Containers Azure☆29Updated 2 weeks ago
- A set of guidelines and best practices for an awesome engineering team☆253Updated this week
- CISA's catalog of bad practices that are exceptionally risky.☆210Updated this week
- Public repo to sync with security-pr☆237Updated last week
- The Elevation of Privilege Threat Modeling Game☆337Updated last year
- OWASP Foundation Web Respository☆25Updated 2 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 6 months ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- info on IAM conferences in northern Europe☆19Updated 2 weeks ago
- ☆21Updated last year
- A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.☆43Updated last week
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆145Updated last month
- Compliance Scorecard OSCAL Policy Standards☆20Updated last year
- Postman collections for Prisma Cloud☆76Updated last year
- A code sample demonstrating how to use Azure Active Directory's preview functionality to issue and consume verifiable credentials.☆113Updated 11 months ago