OWASP / www-project-devsecops-maturity-modelLinks
OWASP Foundation Web Respository
☆55Updated 2 years ago
Alternatives and similar repositories for www-project-devsecops-maturity-model
Users that are interested in www-project-devsecops-maturity-model are comparing it to the libraries listed below
Sorting:
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆176Updated 9 months ago
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆59Updated 5 months ago
- OWASP Foundation Web Respository☆98Updated 7 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆71Updated last year
- ☆121Updated 2 weeks ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated 2 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆107Updated 9 months ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- Software Component Verification Standard (SCVS)☆149Updated 5 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- The source files and tools needed to build the OWASP Cornucopia decks in various languages☆76Updated this week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- Secure Software Development Fundamentals courses (from the OpenSSF Best Practices WG)☆197Updated last month
- A deliberately vulnerable Kubernetes cluster☆128Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated 3 weeks ago
- ☆114Updated last month
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year
- A full insecure kubernetes application for testing security tools☆89Updated 4 months ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆52Updated this week
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆77Updated 2 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- A collection of DevSecOps reference architectures☆69Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Updated last week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated last week