OWASP / www-project-cyber-defense-matrixLinks
Documentation on the Cyber Defense Matrix
☆25Updated 2 years ago
Alternatives and similar repositories for www-project-cyber-defense-matrix
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
Sorting:
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- ☆48Updated 2 years ago
- Controls Assessment Specification☆70Updated 6 months ago
- ☆119Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆73Updated 2 weeks ago
- ☆98Updated 3 years ago
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Updated 5 years ago
- ☆55Updated 4 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 5 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- ☆133Updated last year
- A community event for security researchers to share their favorite notebooks☆108Updated last year
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- ☆187Updated 3 weeks ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆77Updated 3 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Incident Response Playbooks☆14Updated 6 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆134Updated 2 weeks ago
- ☆88Updated 4 years ago
- ☆33Updated last year
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆82Updated 3 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- OWASP Foundation Web Respository☆31Updated last week
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 7 months ago
- ☆33Updated 3 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆85Updated last year