JupiterOne-Archives / data-model
☆16Updated 10 months ago
Alternatives and similar repositories for data-model:
Users that are interested in data-model are comparing it to the libraries listed below
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆17Updated last month
- Alert rules for JupiterOne security auditing☆13Updated last month
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- Continuous Audit Metrics☆25Updated 9 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆15Updated last week
- Automate vulnerability triage which prioritizes remediation over discovery☆15Updated this week
- The SOCless automation framework☆138Updated last month
- Security-focused Chaos Experiments for DevSecOps Teams☆25Updated 2 months ago
- A project to visualize the software supply chain☆39Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Updated 5 months ago
- ☆10Updated 2 years ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆21Updated this week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆105Updated 5 months ago
- A node.js client wrapper for JupiterOne public API and a CLI utility☆14Updated this week
- Static analysis for CloudFormation templates to identify common misconfiguration☆57Updated 3 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- ☆16Updated 10 months ago
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆40Updated 4 months ago
- Darkbit Cloud Security Tools☆25Updated 4 years ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆77Updated 10 months ago
- https://breaches.cloud☆38Updated 5 months ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- ☆216Updated 3 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Updated 3 years ago
- ☆21Updated last year
- Graph-based security analysis for everyone☆343Updated last year