OWASP / www-project-devsecops-guideline
The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use in this matter. Also, the project is trying to help us promote the shift-left security culture in our development process.
☆62Updated 7 months ago
Alternatives and similar repositories for www-project-devsecops-guideline:
Users that are interested in www-project-devsecops-guideline are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆54Updated last year
- A full insecure kubernetes application for testing security tools☆64Updated last week
- OWASP Foundation Web Respository☆42Updated 4 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆59Updated 6 months ago
- Awesome resources about Security in Kubernetes☆40Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆97Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆99Updated last month
- OWASP Foundation Web Respository☆81Updated 4 months ago
- OWASP Foundation Web Respository☆19Updated 2 weeks ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆54Updated this week
- A deliberately vulnerable Kubernetes cluster☆120Updated last year
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated last month
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆105Updated last year
- OWASP Kubernetes Security Testing Guide☆37Updated 4 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated last month
- An AWS IAM policy statement parser and query tool.☆166Updated 11 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆271Updated 4 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- OWASP Code Review Guide Web Repository☆129Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- ☆122Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆65Updated 4 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆175Updated 6 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated this week
- OWASP Kubernetes security and compliance tool [WIP]☆105Updated last year
- A collection of DevSecOps reference architectures☆66Updated 3 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆119Updated 2 years ago
- ☆90Updated last month
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated 11 months ago