OWASP / Software-Component-Verification-StandardLinks
Software Component Verification Standard (SCVS)
☆150Updated 7 months ago
Alternatives and similar repositories for Software-Component-Verification-Standard
Users that are interested in Software-Component-Verification-Standard are comparing it to the libraries listed below
Sorting:
- A repository with examples of CycloneDX BOMs (SBOM, SaaSBOM, OBOM, VEX, etc)☆207Updated 3 weeks ago
- threatspec - continuous threat modeling, through code☆369Updated 4 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆84Updated last week
- OpenSSF Security Tooling Working Group☆318Updated 4 months ago
- Core model including reused documentation☆99Updated 5 months ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago
- A Continuous Threat Modeling methodology☆327Updated 3 years ago
- ☆125Updated last week
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated last month
- The OpenSSF Vulnerability Disclosures Working Group seeks to help improve the overall security of the open source software ecosystem by h…☆203Updated last month
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- OWASP Foundation Web Respository☆28Updated last week
- OWASP CycloneDX is a full-stack Bill of Materials (BOM) standard that provides advanced supply chain capabilities for cyber risk reductio…☆439Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆51Updated last week
- This project is about creating and publishing threat model examples.☆427Updated 4 years ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- ☆33Updated 3 years ago
- ☆111Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- Container Security Verification Standard☆58Updated 6 years ago
- Utility that provides an API platform for validating, querying and managing BOM data☆123Updated last month
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Agile Threat Modeling Toolkit☆708Updated 2 months ago
- A community collection of security reviews of open source software components.☆95Updated last year
- Sample scan files for testing DefectDojo imports☆84Updated 2 months ago
- A standard API specification for exchanging supply chain artifacts and intelligence☆90Updated last week
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆197Updated 3 months ago
- OWASP Foundation Web Respository☆56Updated last month
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆191Updated last year