OWASP / www-project-cyber-defense-matrix
Documentation on the Cyber Defense Matrix
☆24Updated last year
Alternatives and similar repositories for www-project-cyber-defense-matrix:
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- ☆54Updated 3 years ago
- Controls Assessment Specification☆69Updated 8 months ago
- ☆42Updated 4 years ago
- ☆42Updated 2 years ago
- ☆44Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 8 months ago
- ☆93Updated 2 years ago
- OWASP Foundation Web Respository☆28Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago
- ☆117Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 4 months ago
- ☆131Updated 11 months ago
- The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they in…☆19Updated 6 years ago
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆136Updated this week
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆14Updated 2 weeks ago
- Open FAIR Course☆13Updated 5 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆108Updated 5 years ago
- My Jupyter Notebooks☆36Updated 10 months ago
- MITRE ATT&CK Based App in Power BI☆14Updated 11 months ago
- Incident Response Playbooks☆14Updated 5 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆36Updated 2 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Intrusion Detection Honeypots Book Code☆24Updated 4 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago