NIST 800-53 Baseline Configuration Tool
☆15Aug 23, 2024Updated last year
Alternatives and similar repositories for NIST_800-53r5_Baseline_Config_PowerBI_
Users that are interested in NIST_800-53r5_Baseline_Config_PowerBI_ are comparing it to the libraries listed below
Sorting:
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- A collection of security related user stories compatible with NIST Special Publication 800-53☆38Mar 14, 2017Updated 8 years ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆107Jan 2, 2025Updated last year
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- Ansible-based deployment automation for the OpenConext platform☆14Updated this week
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Feb 25, 2026Updated last week
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 25, 2026Updated last week
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Go implementation of OpenID Federation☆12Updated this week
- A specification for DID create/update/deactivate operations.☆11Jan 3, 2025Updated last year
- The purpose this solution provides is automated notifications for how many passed, not passed, failed, and warning findings for each memb…☆10Dec 5, 2022Updated 3 years ago
- ☆12Jun 17, 2024Updated last year
- 🔐 Google Cloud Workload Identity Federation Examples and How-To☆12Nov 24, 2025Updated 3 months ago
- Transfer file over Dns☆10Nov 26, 2024Updated last year
- Design documents and interoperability tests for Interoperable RA-TLS projects☆13Jan 8, 2024Updated 2 years ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆11Jan 3, 2023Updated 3 years ago
- Keycloak gRPC extension☆12Mar 2, 2023Updated 3 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- ☆11Jan 17, 2025Updated last year
- ☆12Apr 17, 2022Updated 3 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- ☆10Aug 11, 2025Updated 6 months ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ☆12Sep 8, 2025Updated 6 months ago
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- Azure - IaaS Storage Monitoring☆11Feb 21, 2023Updated 3 years ago
- Exploit funcionales para pruebas de seguridad en entornos industriales☆11Jul 8, 2020Updated 5 years ago
- Automate rule management for AWS Network Firewall☆17Mar 2, 2026Updated last week
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆12Dec 4, 2024Updated last year