SecurityBagel / NIST_800-53r5_Baseline_Config_PowerBI_View external linksLinks
NIST 800-53 Baseline Configuration Tool
☆15Aug 23, 2024Updated last year
Alternatives and similar repositories for NIST_800-53r5_Baseline_Config_PowerBI_
Users that are interested in NIST_800-53r5_Baseline_Config_PowerBI_ are comparing it to the libraries listed below
Sorting:
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Pulled the H-1 Table from the NIST SP 800-53 Rev. 4. Table maps applicable NIST controls to the ISO/IEC 27001 Controls☆20Aug 5, 2019Updated 6 years ago
- A collection of security related user stories compatible with NIST Special Publication 800-53☆37Mar 14, 2017Updated 8 years ago
- NIST SP 800-53 Rev 5 as Data☆25Apr 4, 2020Updated 5 years ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆105Jan 2, 2025Updated last year
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- Ansible-based deployment automation for the OpenConext platform☆14Updated this week
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- The purpose this solution provides is automated notifications for how many passed, not passed, failed, and warning findings for each memb…☆10Dec 5, 2022Updated 3 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Oct 30, 2025Updated 3 months ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Jan 9, 2026Updated last month
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- A specification for DID create/update/deactivate operations.☆11Jan 3, 2025Updated last year
- Nutritionix iOS library for communication with Nutritionix API service☆11Jun 10, 2014Updated 11 years ago
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Oct 14, 2025Updated 4 months ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- ☆12Jun 17, 2024Updated last year
- Go implementation of OpenID Federation☆12Feb 9, 2026Updated last week
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- 🔐 Google Cloud Workload Identity Federation Examples and How-To☆12Nov 24, 2025Updated 2 months ago
- ☆11Jan 3, 2023Updated 3 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Keycloak gRPC extension☆12Mar 2, 2023Updated 2 years ago
- This plugin can be used to extract a WordPress website and generate android app using cordova and phonegap☆10Aug 18, 2014Updated 11 years ago
- 💪 Working 8 hours a day in front of a computer exposes you to specific health challenges. This guide provides community tips on improvin…☆12Aug 23, 2023Updated 2 years ago
- ☆10Aug 11, 2025Updated 6 months ago
- [Deprecated] This solution helps customers reduce operational complexity and enables administrators to quickly create manual, event-based…☆14Mar 8, 2023Updated 2 years ago
- Batch scripts for signing and getting cert keys on Windows.☆26Jan 23, 2014Updated 12 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago