TristanToye / SOC2-guide
Documenting SOC 2 tools and processes
☆79Updated 3 years ago
Alternatives and similar repositories for SOC2-guide:
Users that are interested in SOC2-guide are comparing it to the libraries listed below
- Template SOC2 Policy Authority - documentation pipeline☆110Updated 4 years ago
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆36Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 10 months ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆84Updated 10 months ago
- A Software as a Service (SaaS) log collection framework.☆164Updated last week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- The SOCless automation framework☆139Updated 2 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Security policies for Tailscale☆288Updated this week
- Automate the creation of a System Security Plan (SSP)☆38Updated this week
- Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe …☆387Updated this week
- Generate security policies and documents based on KPNs templates.☆38Updated 5 years ago
- ☆44Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆186Updated 7 months ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆163Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- A list of cloud security tools and vendors.☆160Updated 7 months ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 6 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- Controls Assessment Specification☆69Updated 3 weeks ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆164Updated 11 months ago
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking. https://gapps…☆531Updated 3 months ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆117Updated 9 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- A collection of projects supporting AWS Integration☆155Updated 3 weeks ago
- Boilerplate Incident Response Plan from "Starting Up Security"☆163Updated 4 years ago
- Docker build of GovReady☆14Updated last year
- AWS honey token manager☆87Updated 8 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆39Updated 3 months ago