LeeMangold / OpenGRCLinks
OpenGRC
☆31Updated this week
Alternatives and similar repositories for OpenGRC
Users that are interested in OpenGRC are comparing it to the libraries listed below
Sorting:
- Overview of existing mappings from and to cyber security controls☆15Updated last year
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- A Secure Controls Framework (SCF) Power BI App☆21Updated 7 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- Compliance Scorecard OSCAL Policy Standards☆18Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆78Updated 2 months ago
- ☆104Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆22Updated 4 months ago
- A curated list of Awesome Threat Intelligence blogs☆63Updated last year
- NIST 800-53 Baseline Configuration Tool☆13Updated 9 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆92Updated 5 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated last month
- A collection of sources of documentation and best practices to build and run a SOC☆55Updated 2 years ago
- KEV EPSS Data☆25Updated this week
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated 3 months ago
- OWASP Foundation Web Respository☆52Updated last week
- Generate a matrix based on an inventory of InfoSec tools☆23Updated 11 months ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆26Updated 10 months ago
- Core model including reused documentation☆98Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆87Updated last year
- NOVA: The Prompt Pattern Matching☆114Updated last month
- Generated a compliance checklist report, asset register and risk register. Implemented policies on various controls of ISO27001:2013 stan…☆29Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- Very easy risk assessment (for infosec and more)☆31Updated last month
- OWASP Foundation Web Respository☆31Updated 2 years ago
- ☆73Updated 2 months ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆80Updated last month
- ☆36Updated 5 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆254Updated 2 months ago