OWASP / www-project-cyber-defense-matrix
Documentation on the Cyber Defense Matrix
☆24Updated 2 years ago
Alternatives and similar repositories for www-project-cyber-defense-matrix:
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Controls Assessment Specification☆69Updated last month
- OWASP Foundation Web Respository☆31Updated 2 years ago
- ☆44Updated 2 years ago
- ☆54Updated 3 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- ☆16Updated 2 years ago
- ☆32Updated last year
- ☆18Updated 3 years ago
- ☆42Updated 4 years ago
- ☆118Updated last year
- Incident Response Playbooks☆14Updated 5 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A Secure Controls Framework (SCF) Power BI App☆17Updated 6 months ago
- Stakeholder-Specific Vulnerability Categorization☆147Updated 3 weeks ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆27Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- ☆94Updated 2 years ago
- ☆65Updated 2 months ago
- ☆87Updated 3 years ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆76Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Threat Modeling Manifesto☆28Updated 9 months ago
- Tool used to perform threat intelligence against packet data☆35Updated 3 months ago
- ☆42Updated 2 years ago
- ☆65Updated 11 months ago