adamshostack / 4QuestionFrame
Shostack's 4 Question Frame for Threat Modeling
☆101Updated last month
Alternatives and similar repositories for 4QuestionFrame:
Users that are interested in 4QuestionFrame are comparing it to the libraries listed below
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆150Updated last year
- ☆212Updated 2 months ago
- Example policies demonstrating how to implement a data perimeter on AWS.☆147Updated this week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 3 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆514Updated last week
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆247Updated this week
- List of vendors that do not allow IMDSv2 enforcement☆141Updated 9 months ago
- ☆115Updated last month
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆232Updated last week
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆246Updated this week
- SCP management tool☆130Updated last year
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- ☆112Updated last month
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated 8 months ago
- Resource types that can be publicly exposed on AWS☆322Updated 2 years ago
- This solutions facilitates rapid deployment of Prowler, full AWS Organization analysis, and finding processing as part of a security post…☆54Updated 2 months ago
- Crowdsourced list of sensitive IAM Actions☆141Updated 3 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆379Updated 3 weeks ago
- ☆17Updated last year
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆141Updated 11 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- This solution supports a bidirectional integration between Security Hub and JIRA. Issues can be either created automatically or manually …☆37Updated 6 months ago
- List of known AWS accounts☆181Updated last week
- OWASP Foundation Web Respository☆14Updated 3 years ago
- Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frame…☆225Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- ☆400Updated last week
- ☆85Updated last year