OWASP / www-project-devsecops-maturity-model
OWASP Foundation Web Respository
☆52Updated last year
Related projects: ⓘ
- OWASP Foundation Web Respository☆79Updated 2 weeks ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆58Updated 3 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆165Updated 7 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆47Updated this week
- OWASP Kubernetes Security Testing Guide☆37Updated 2 weeks ago
- ☆106Updated 3 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆47Updated 3 years ago
- Count distinct contributor of Snyk watched repos across several SCM☆30Updated 2 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆54Updated 2 months ago
- A full insecure kubernetes application for testing security tools☆41Updated last week
- A collection of diagramming tools to help create DevOps/DevSecOps reference architectures☆59Updated 11 months ago
- Vulnerable Kustomize Kubernetes templates for training and education☆47Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆93Updated 9 months ago
- Compares and analyzes GCP IAM roles.☆76Updated 3 months ago
- https://breaches.cloud☆36Updated 2 months ago
- OWASP Foundation Web Respository☆37Updated 2 weeks ago
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆13Updated 4 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆136Updated 2 years ago
- ☆76Updated this week
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆65Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆98Updated 3 months ago
- A utility to (re-)import findings and language data into DefectDojo☆42Updated 6 months ago
- Threat Modeling Manifesto☆24Updated 2 months ago
- Software Component Verification Standard (SCVS)☆133Updated 5 months ago
- A deliberately vulnerable Kubernetes cluster☆117Updated 9 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆169Updated 3 weeks ago
- a tool to audit the istio service mesh☆173Updated 2 years ago
- Cfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates ho…☆91Updated last month
- ☆90Updated 4 months ago