SecurityBagel / NIST_800-53r5_Baseline_Config_PowerBI_Links
NIST 800-53 Baseline Configuration Tool
☆14Updated last year
Alternatives and similar repositories for NIST_800-53r5_Baseline_Config_PowerBI_
Users that are interested in NIST_800-53r5_Baseline_Config_PowerBI_ are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆26Updated last year
- MITRE ATT&CK Based App in Power BI☆17Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 11 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆26Updated last month
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆102Updated last year
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- NIST CSF Maturity Toolkit☆114Updated 7 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆51Updated 4 years ago
- Controls Assessment Specification☆70Updated 9 months ago
- ☆49Updated 2 years ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆45Updated 5 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆51Updated last month
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆48Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 3 months ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Updated last month
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆143Updated 2 weeks ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Updated 2 years ago
- Automating Security Detection Engineering, published by Packt☆65Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- ☆18Updated 4 years ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- ☆21Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆86Updated 3 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆50Updated last year
- Incident Response Playbooks☆15Updated 6 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated 6 months ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆46Updated 6 months ago