OWASP / www-project-threat-and-safeguard-matrix
OWASP Foundation Web Respository
☆23Updated last month
Alternatives and similar repositories for www-project-threat-and-safeguard-matrix:
Users that are interested in www-project-threat-and-safeguard-matrix are comparing it to the libraries listed below
- Controls Assessment Specification☆69Updated this week
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆112Updated last week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 5 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- NIST CyberSecurity Framework management tool☆161Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Continuous Audit Metrics☆25Updated 9 months ago
- ☆131Updated last year
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆382Updated 11 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- ☆36Updated last year
- Cloud security tutorials and best practices☆38Updated 2 years ago
- One Conference 2024☆108Updated 5 months ago
- ☆82Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆69Updated 10 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆225Updated 2 years ago
- A Command-line tool which leverages the Tenable.io API to reduce the time it takes to get information that is common during remediation o…☆74Updated 6 months ago
- The SOCless automation framework☆139Updated last month
- OCSF Documentation☆127Updated last month
- Cloud deployment size calculation utilities☆18Updated 2 months ago
- NIST CSF Maturity Toolkit☆35Updated last month
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they in…☆20Updated 6 years ago