QIntegration / Qualys-Jira-Connector
Qualys Jira Connector
☆11Updated 2 months ago
Alternatives and similar repositories for Qualys-Jira-Connector:
Users that are interested in Qualys-Jira-Connector are comparing it to the libraries listed below
- Generates runbooks for GuardDuty findings☆35Updated 9 months ago
- ☆65Updated 7 months ago
- Detect publicly accessible Lambda Function URLs in your AWS account☆9Updated 2 years ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆69Updated 10 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆147Updated last month
- ☆114Updated last week
- Examples of various Entra ID scenarios in Terraform☆15Updated 6 months ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆71Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- Discover for Cloud and Containers Azure☆29Updated last month
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆58Updated last year
- A Secure Controls Framework (SCF) Power BI App☆16Updated 4 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆164Updated 10 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 2 weeks ago
- ☆45Updated this week
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 7 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆174Updated this week
- ☆41Updated last month
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 5 months ago
- Cross cloud workload identity research and workshops☆36Updated last week
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- The SOCless automation framework☆139Updated last month
- ☆29Updated 4 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆88Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆145Updated 9 months ago
- ☆41Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 4 months ago