aelogica / hippa-compliance-policies
WIP: A set of policies based on Catalyze.io's open sourced and vetted policies for HIPPA compliance.
☆13Updated 10 years ago
Alternatives and similar repositories for hippa-compliance-policies:
Users that are interested in hippa-compliance-policies are comparing it to the libraries listed below
- HIPAA Policies and Procedures for Clinical Meteor Apps.☆12Updated 8 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- A curated threat modeling library collection☆22Updated last year
- Misc resources and documents on my security research☆21Updated 8 years ago
- ☆16Updated 7 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Updated 8 years ago
- ☆9Updated 9 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java)☆32Updated last year
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 8 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Vendor-Neutral Security Tool Automation Controller (over REST)☆29Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- notes on configuring aws organizations☆11Updated 8 years ago
- AppSecPipeline Specification for DevOps automation.☆39Updated 2 years ago
- ☆12Updated 6 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆12Updated this week
- Privacy Cards for Software Developers☆52Updated 5 years ago
- A Java library for parsing and programmatically using threat models☆79Updated 2 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- open-source intelligence gathering for SIEMs <3☆38Updated 8 years ago
- Logstash Configs used by Netflix☆31Updated 9 years ago
- ☆11Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- ☆79Updated 9 years ago