PagerDuty / devsecops-docs
DevSecOps Guide, located devsecops.pagerduty.com
☆13Updated 3 years ago
Alternatives and similar repositories for devsecops-docs:
Users that are interested in devsecops-docs are comparing it to the libraries listed below
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- The Auditree data gathering and reporting tool.☆13Updated 7 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- The Auditree tool for adding external evidence.☆10Updated 6 months ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆14Updated 3 months ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Zsh and Vim on new Linux boxen.☆16Updated 2 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Tachikoma is a security alerting framework for human beings☆22Updated 6 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Open source cookbooks used by the login.gov team☆10Updated 2 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 3 months ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 2 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆22Updated 3 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Notebook collection☆10Updated 5 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- A curated list of Cloud Security techniques and tools☆30Updated last year
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- ☆11Updated 8 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated this week
- Ansible role for security standards compliance☆13Updated 6 years ago
- OWASP Foundation Web Respository☆27Updated last month
- Falcon Integration Gateway (FIG)☆18Updated 3 weeks ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 3 weeks ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 6 years ago
- Create machine images containing the Guacamole remote desktop gateway☆10Updated this week