OWASP / www-project-devsecops-maturity-modelLinks
OWASP Foundation Web Respository
☆56Updated 3 weeks ago
Alternatives and similar repositories for www-project-devsecops-maturity-model
Users that are interested in www-project-devsecops-maturity-model are comparing it to the libraries listed below
Sorting:
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 11 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- OWASP Foundation Web Respository☆99Updated 2 weeks ago
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆59Updated 6 months ago
- ☆123Updated this week
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Software Component Verification Standard (SCVS)☆150Updated 6 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆108Updated 11 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated 2 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆51Updated this week
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆21Updated 2 years ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆197Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆111Updated last year
- Manage a uniform team of security managers for every organization in your enterprise☆25Updated last week
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆74Updated 3 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆197Updated 2 months ago
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆168Updated this week
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated last month
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated last week
- For engineers and security teams driving fast and secure software supply chains☆84Updated 2 years ago