OWASP / DevSecOpsGuidelineLinks
The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.
☆931Updated 3 months ago
Alternatives and similar repositories for DevSecOpsGuideline
Users that are interested in DevSecOpsGuideline are comparing it to the libraries listed below
Sorting:
- ☆526Updated last week
- Checklist for container security - devsecops practices☆1,572Updated last year
- A curated list of awesome CI CD security resources☆546Updated 7 months ago
- Security Remediation Guides☆725Updated 3 months ago
- 📚 A curated list of awesome Docker security resources☆673Updated 7 months ago
- Curating the best DevSecOps resources and tooling.☆1,515Updated 10 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,978Updated 5 months ago
- A curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.☆605Updated 2 weeks ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,542Updated 10 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,183Updated 6 months ago
- OWASP Foundation Web Respository☆585Updated last year
- ☆415Updated 2 years ago
- Security Champions Playbook v 2.1☆369Updated last year
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,382Updated 2 weeks ago
- ♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎☆1,951Updated last month
- A curated list of awesome Kubernetes security resources☆928Updated last year
- Agile Threat Modeling Toolkit☆665Updated last month
- Getting a handle on container security☆653Updated last year
- A curated list for Awesome Kubernetes Security resources☆1,954Updated last year
- Threat matrix for CI/CD Pipeline☆751Updated 10 months ago
- This project is about creating and publishing threat model examples.☆419Updated 3 years ago
- Kubernetes Security Checklist and Requirements - All in One (authentication, authorization, logging, secrets, configuration, network, wor…☆475Updated 3 years ago
- Vulnerable app with examples showing how to not use secrets☆1,317Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,857Updated 2 weeks ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,643Updated last week
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆518Updated 3 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆431Updated 2 months ago
- Security interview questions with possible explanation for roles in AppSec, Pentesting, Cloud Security, DevSecOps, Network Security and s…☆349Updated 5 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year