OWASP / www-project-devsecops-guideline
The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use in this matter. Also, the project is trying to help us promote the shift-left security culture in our development process.
☆66Updated 9 months ago
Alternatives and similar repositories for www-project-devsecops-guideline:
Users that are interested in www-project-devsecops-guideline are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆55Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- OWASP Foundation Web Respository☆82Updated 2 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- A full insecure kubernetes application for testing security tools☆70Updated last week
- NextJS-based single-page application for completing and reviewing SAMM assessments☆72Updated 2 years ago
- ☆406Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- ☆123Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated 3 weeks ago
- OWASP Foundation Web Respository☆19Updated 2 weeks ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆123Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- OWASP Code Review Guide Web Repository☆132Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 8 months ago
- ☆175Updated 4 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- OWASP Kubernetes Security Testing Guide☆37Updated 6 months ago
- An AWS IAM policy statement parser and query tool.☆174Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆67Updated 4 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆103Updated 3 months ago
- ☆98Updated 2 weeks ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆182Updated 6 months ago
- ☆164Updated 6 months ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆39Updated 6 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated last year
- OWASP Foundation Web Respository☆44Updated 6 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆152Updated last year
- ☆61Updated last month