MarkSimos / MCRALinks
The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
☆21Updated 7 years ago
Alternatives and similar repositories for MCRA
Users that are interested in MCRA are comparing it to the libraries listed below
Sorting:
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆134Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- Controls Assessment Specification☆70Updated 10 months ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- ☆56Updated 4 years ago
- Unlocking Serverless Computing to Assess Security Controls☆262Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 4 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- Building environments to replicate small networks and deploy applications☆331Updated last month
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆119Updated last year
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Updated 2 years ago
- Repository with Sample KQL Query examples for Threat Hunting☆217Updated 3 years ago
- Sysmon configuration file template with default high-quality event tracing☆20Updated 5 years ago
- Incident Response Playbooks☆15Updated 6 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆77Updated 5 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Updated 4 years ago
- ☆23Updated 2 years ago
- Creating a resource to help build and manage an Insider Threat program.☆101Updated last year
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Updated 5 years ago
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆268Updated last year
- ☆99Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆238Updated 5 years ago
- A python package for use in generating fake data for SOC and security automation.☆175Updated 11 months ago
- Purple Teaming Attack & Hunt Lab - Terraform☆163Updated 4 years ago
- CONVEX is a group of CTFs that are independently deployable into participant Azure environments.☆140Updated 3 years ago