OWASP / www-project-cyber-defense-matrix
Documentation on the Cyber Defense Matrix
☆24Updated last year
Alternatives and similar repositories for www-project-cyber-defense-matrix:
Users that are interested in www-project-cyber-defense-matrix are comparing it to the libraries listed below
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Controls Assessment Specification☆69Updated this week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 5 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated last year
- ☆44Updated 2 years ago
- OWASP Foundation Web Respository☆29Updated 2 years ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- A Secure Controls Framework (SCF) Power BI App☆16Updated 4 months ago
- ☆117Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 10 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆27Updated last year
- ☆131Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 4 months ago
- ☆93Updated 2 years ago
- ☆18Updated 3 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- ☆54Updated 3 years ago
- ☆65Updated 10 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 2 years ago
- ☆42Updated 2 years ago
- Open FAIR Course☆13Updated 5 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆80Updated last year
- ☆32Updated last year
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆69Updated 10 months ago
- NIST CyberSecurity Framework management tool☆161Updated 3 years ago
- Cloud security tutorials and best practices☆38Updated 2 years ago