IDPros / bokLinks
This is a public comment environment for the IDPro body of knowledge.
☆73Updated 4 months ago
Alternatives and similar repositories for bok
Users that are interested in bok are comparing it to the libraries listed below
Sorting:
- Collaboration on the table of contents for IDPro Body of Knowledge☆20Updated 2 years ago
- A simple way to deploy SailPoint's IdentityIQ into a series of docker containers mimicking the core components of most development enviro…☆49Updated 3 years ago
- Minimum guardrails for GC's cloud operationalization framework.☆98Updated 8 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆54Updated 5 months ago
- Rapidly apply hundreds of security controls in Azure☆184Updated 3 months ago
- OpenID Shared Signals Working Group Repository☆65Updated 3 weeks ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆253Updated this week
- Call Okta API from PowerShell -- unofficial code.☆42Updated last year
- A code sample demonstrating how to use Azure Active Directory's preview functionality to issue and consume verifiable credentials.☆113Updated 11 months ago
- OCSF Documentation☆139Updated 2 months ago
- Website for ASD's Blueprint for Secure Cloud☆87Updated 3 weeks ago
- CISA's catalog of bad practices that are exceptionally risky.☆209Updated 3 months ago
- Public repo to sync with security-pr☆237Updated this week
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆173Updated 2 months ago
- Various deployments of the OSCAL editor☆46Updated last year
- Example demonstrating how to customize PingDirectory, PingFederate and PingAccess Docker containers by applying configuration files☆62Updated 3 weeks ago
- Threats Manager Platform Core libraries and SDK☆75Updated 4 months ago
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆42Updated 3 years ago
- NIST SP 800-53 content and other OSCAL content examples☆372Updated this week
- FedRAMP Automation☆343Updated 4 months ago
- info on IAM conferences in northern Europe☆18Updated last month
- The Elevation of Privilege Threat Modeling Game☆336Updated last year
- Public repo for CloudAppSecurityDocs-pr☆111Updated 7 months ago
- A profile designed for ID Tokens so that they can be issued through OIDC Authorization Servers and having support for cryptographic bindi…☆13Updated 6 months ago
- The repository contains artifacts to create and publish reports, alerts, and dashboards based on Azure AD B2C logs. These artifacts can a…☆65Updated 2 years ago
- Microsoft Security Guidance☆251Updated last year
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- Supplemental information and resources for the Security Benchmark documentation available at https://docs.microsoft.com/azure/security/be…☆465Updated last year
- Using SCIM protocol as a gateway for user provisioning to other endpoints☆197Updated last week
- A mirror of ISM OSCAL documents. The authoritative source can be found at https://www.cyber.gov.au/ism/oscal.☆42Updated last month