USArmyResearchLab / ARL-Open-Source-Guidance-and-InstructionsLinks
The U.S. Army Research Laboratory (ARL) Software Release Process for Unrestricted Public Release
☆47Updated 6 years ago
Alternatives and similar repositories for ARL-Open-Source-Guidance-and-Instructions
Users that are interested in ARL-Open-Source-Guidance-and-Instructions are comparing it to the libraries listed below
Sorting:
- 2017 - 2018 Certificate Policy development and drafting for Federal Public Trust Device PKI.☆43Updated last year
- The Digital Standard is an ambitious, community-led effort to build a framework to test and rate products and services on the basis of pr…☆133Updated 2 years ago
- NIST/NCCoE Mobile Threat Catalogue☆149Updated last year
- CVE Automation Working Group☆173Updated this week
- Creates a code.gov code inventory JSON file based on GitHub repository information. #nsacyber☆26Updated 6 years ago
- FedRAMP Tailored.☆48Updated 3 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- This is the old location for the PIV Playbook. New location below.☆71Updated 4 years ago
- CVE Project Documentation☆83Updated 3 weeks ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆94Updated last year
- Python library for getting metadata from source code hosting tools☆52Updated 3 months ago
- OpenSSF Endusers Working Group☆28Updated last year
- OpenSSF Governance and Legal Docs☆72Updated 2 weeks ago
- US Digital Registry.☆88Updated 2 years ago
- Qubes-based SecureDrop Journalist Workstation environment for submission handling☆150Updated this week
- A site for CISA directives☆164Updated last year
- Federal data strategy website☆24Updated 3 weeks ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆222Updated last year
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆71Updated last year
- SWAMP-in-a-Box☆62Updated 4 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆73Updated last month
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆71Updated 2 months ago
- A repository for the data underlying the FedRamp Dashboard☆35Updated this week
- cloud.gov security policies and procedures☆25Updated 2 months ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆74Updated 8 months ago
- The CFPB's official Source Code Policy.☆38Updated 3 years ago
- Distributed P2P Data-driven Workflow Framework☆267Updated this week
- Exploit Prediction Scoring System (EPSS)☆30Updated 3 years ago
- The OVAL Language Schemas☆87Updated 10 months ago
- Cyber Intelligence Ontology☆56Updated 8 years ago