OWASP / www-project-cyber-defense-matrixLinks
Documentation on the Cyber Defense Matrix
☆24Updated 2 years ago
Alternatives and similar repositories for www-project-cyber-defense-matrix
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
Sorting:
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 5 years ago
- Controls Assessment Specification☆70Updated 2 months ago
- ☆54Updated 4 years ago
- ☆46Updated 2 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they in…☆20Updated 7 years ago
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆42Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆62Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 7 months ago
- ☆120Updated last year
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- ☆23Updated 2 years ago
- ☆131Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆41Updated 3 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- ☆95Updated 2 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- ☆77Updated 2 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆64Updated 2 years ago
- ☆17Updated 2 years ago