OWASP / www-project-devsecops-maturity-modelLinks
OWASP Foundation Web Respository
☆57Updated 2 months ago
Alternatives and similar repositories for www-project-devsecops-maturity-model
Users that are interested in www-project-devsecops-maturity-model are comparing it to the libraries listed below
Sorting:
- A collection of DoD and Federal Government Cloud Computing Resources☆49Updated 4 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆178Updated 2 weeks ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆68Updated 6 months ago
- OWASP Foundation Web Respository☆100Updated this week
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆58Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆78Updated last week
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Updated 4 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- ☆131Updated last week
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated last month
- A tool to check the security settings of Github Organizations.☆75Updated 2 years ago
- ☆114Updated 4 months ago
- A deliberately vulnerable Kubernetes cluster☆130Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆44Updated 3 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆108Updated 2 years ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆201Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 9 months ago
- For engineers and security teams driving fast and secure software supply chains☆85Updated 2 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated 7 months ago
- Microsoft Defender for Cloud threat matrix for Kubernetes☆30Updated 2 years ago
- Software Component Verification Standard (SCVS)☆152Updated 8 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆109Updated last year
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated 4 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated 2 weeks ago
- Manage a uniform team of security managers for every organization in your enterprise☆25Updated last week
- a tool to audit the istio service mesh☆173Updated 4 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆110Updated last year
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- Utilities for programmatic analysis of Cartography data.☆40Updated 3 weeks ago