OWASP / www-project-cyber-defense-matrixLinks
Documentation on the Cyber Defense Matrix
☆24Updated 2 years ago
Alternatives and similar repositories for www-project-cyber-defense-matrix
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
Sorting:
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Controls Assessment Specification☆70Updated 10 months ago
- ☆49Updated 2 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆139Updated 4 years ago
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- Stakeholder-Specific Vulnerability Categorization☆170Updated last week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 3 months ago
- OWASP Foundation Web Respository☆32Updated 3 months ago
- ☆88Updated 4 years ago
- ☆77Updated 3 years ago
- ☆56Updated 4 years ago
- ☆120Updated this week
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆144Updated last month
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆99Updated 3 years ago
- ☆19Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Updated last year
- The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they in…☆21Updated 7 years ago
- Threat Modeling Manifesto☆30Updated last year
- ☆42Updated 5 years ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- ☆76Updated last month
- ☆134Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Updated 2 years ago
- CISA's catalog of bad practices that are exceptionally risky.☆210Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆51Updated 2 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago