OWASP / www-project-devsecops-guideline
The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use in this matter. Also, the project is trying to help us promote the shift-left security culture in our development process.
☆62Updated 8 months ago
Alternatives and similar repositories for www-project-devsecops-guideline:
Users that are interested in www-project-devsecops-guideline are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆81Updated last month
- OWASP Foundation Web Respository☆43Updated 5 months ago
- OWASP Foundation Web Respository☆54Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆97Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆66Updated this week
- OWASP Foundation Web Respository☆19Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆137Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 7 months ago
- ☆163Updated 5 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 2 months ago
- An AWS IAM policy statement parser and query tool.☆173Updated last year
- ☆404Updated 2 years ago
- A deliberately vulnerable Kubernetes cluster☆121Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 5 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Protect against subdomain takeover☆92Updated 8 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆167Updated this week
- OWASP Code Review Guide Web Repository☆129Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- A utility to (re-)import findings and language data into DefectDojo☆42Updated 4 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆101Updated 3 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆99Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- Damn Vulnerable Java (EE) Application☆134Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆85Updated this week
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆102Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆367Updated 3 months ago