SecurityBagel / NIST_800-53r5_Baseline_Config_PowerBI_Links
NIST 800-53 Baseline Configuration Tool
☆14Updated last year
Alternatives and similar repositories for NIST_800-53r5_Baseline_Config_PowerBI_
Users that are interested in NIST_800-53r5_Baseline_Config_PowerBI_ are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆22Updated 10 months ago
- MITRE ATT&CK Based App in Power BI☆17Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 7 months ago
- ☆46Updated last week
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆43Updated 2 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆98Updated 8 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆125Updated 4 years ago
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- NIST CSF Maturity Toolkit☆100Updated 3 months ago
- ☆48Updated 2 years ago
- Controls Assessment Specification☆70Updated 5 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆46Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated 2 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆41Updated 6 months ago
- MCP Server that integrates with Security Copilot, Sentinel and other tools (in the future). It enhance the process of developing , testin…☆18Updated 5 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- WA Cyber Security Unit (DGOV Technical) site☆42Updated this week
- Collection of Microsoft Identity Threat Detection and Response resources.☆49Updated 2 weeks ago
- ☆44Updated last year
- ☆45Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆20Updated 3 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 6 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆190Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆47Updated 4 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆116Updated 5 months ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 5 months ago