OWASP / www-project-top-10-ci-cd-security-risks
OWASP Foundation Web Respository
☆81Updated 4 months ago
Alternatives and similar repositories for www-project-top-10-ci-cd-security-risks:
Users that are interested in www-project-top-10-ci-cd-security-risks are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆54Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆105Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆97Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated last month
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆59Updated 6 months ago
- A utility to (re-)import findings and language data into DefectDojo☆42Updated 3 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆271Updated 4 months ago
- A full insecure kubernetes application for testing security tools☆64Updated last week
- ☆111Updated this week
- Count distinct contributor of Snyk watched repos across several SCM☆31Updated 6 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- A deliberately vulnerable Kubernetes cluster☆120Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆178Updated 4 months ago
- ☆404Updated last year
- Software Component Verification Standard (SCVS)☆137Updated 9 months ago
- OWASP Kubernetes Security Testing Guide☆37Updated 4 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆62Updated 7 months ago
- ☆90Updated last month
- ☆82Updated 3 years ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆151Updated last year
- ☆36Updated 3 years ago
- An AWS IAM policy statement parser and query tool.☆166Updated 11 months ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆184Updated last year
- ☆161Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Protect against subdomain takeover☆93Updated 7 months ago