PagerDuty / devsecops-docsLinks
DevSecOps Guide, located devsecops.pagerduty.com
☆13Updated 3 years ago
Alternatives and similar repositories for devsecops-docs
Users that are interested in devsecops-docs are comparing it to the libraries listed below
Sorting:
- The Auditree data gathering and reporting tool.☆15Updated 10 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last month
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A tool for detecting sensitive data in code repositories☆16Updated last month
- Example Express application for collecting data from the Stethoscope app☆14Updated 7 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Open source cookbooks used by the login.gov team☆10Updated 6 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- A curated list of Cloud Security techniques and tools☆29Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- A poor man's access control for cloud- security groups and firewalls. Enable deployments by temporary allowing addresses!☆13Updated 2 months ago
- ☆10Updated last year
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆23Updated 4 years ago
- ☆11Updated 8 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆22Updated 11 months ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Updated 3 years ago
- CISOfy Handbook☆32Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Falcon Integration Gateway (FIG)☆19Updated 2 months ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated last year
- A service to test mail servers for best practices.☆37Updated 7 years ago
- ☆11Updated 4 years ago