USArmyResearchLab / ARL-Open-Source-Guidance-and-InstructionsLinks
The U.S. Army Research Laboratory (ARL) Software Release Process for Unrestricted Public Release
☆47Updated 7 years ago
Alternatives and similar repositories for ARL-Open-Source-Guidance-and-Instructions
Users that are interested in ARL-Open-Source-Guidance-and-Instructions are comparing it to the libraries listed below
Sorting:
- Distributed P2P Data-driven Workflow Framework☆269Updated this week
- This is the old location for the PIV Playbook. New location below.☆73Updated 4 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Updated 7 months ago
- 2017 - 2018 Certificate Policy development and drafting for Federal Public Trust Device PKI.☆43Updated last year
- The Digital Standard is an ambitious, community-led effort to build a framework to test and rate products and services on the basis of pr…☆134Updated 3 years ago
- This is the old location for the FPKI Playbook. New location below.☆32Updated 4 years ago
- This project leverages Ansible to automate DataWave deployments on your cluster☆26Updated 6 years ago
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆29Updated 6 years ago
- Python library for getting metadata from source code hosting tools☆53Updated 7 months ago
- A repository for the data underlying the FedRamp Dashboard☆37Updated this week
- Site for NSA's Open Source project listing☆306Updated 2 months ago
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆76Updated last year
- Federal Register 2.0 Web Display☆45Updated 3 weeks ago
- NIST/NCCoE Mobile Threat Catalogue☆149Updated 4 months ago
- OpenSSF Governance and Legal Docs☆73Updated 3 months ago
- Public home for NIST open source software catalog☆19Updated 3 months ago
- CVE Automation Working Group☆180Updated this week
- Intel Atom C2000 series discovery tool that parses log files and returns results if a positive match is found. #nsacyber☆28Updated 8 years ago
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆165Updated this week
- Trusted Computing based services supporting TPM provisioning and supply chain validation concepts. #nsacyber☆203Updated this week
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated last year
- The OVAL Language Schemas☆87Updated last year
- YAML schema, examples, and validators for OpenControl format.☆76Updated 6 years ago
- All the excellent centers☆16Updated 4 months ago
- Data-driven automation platform☆309Updated 2 years ago
- IDManagement.gov is a collaboration between GSA and the Federal CIO Council. It is managed by the Identity Assurance and Trusted Access D…☆45Updated last week
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆166Updated 6 years ago
- WaterSlide is a streaming event-at-a-time architecture for processing metadata. It is designed to take in a set of streaming events from …☆117Updated 4 years ago
- Simulate realistic trajectory data seen through sporadic reporting☆164Updated 9 months ago