ajy0127 / aws_automated_access_reviewLinks
AWS Access Review is a comprehensive, zero-configuration security assessment tool that automatically evaluates your AWS environment for potential security risks and compliance gaps.
☆20Updated 9 months ago
Alternatives and similar repositories for aws_automated_access_review
Users that are interested in aws_automated_access_review are comparing it to the libraries listed below
Sorting:
- This GRC Portfolio Hub is my initiative to empower GRC professionals in showcasing their practical AWS GRC engineering implementation ski…☆41Updated 5 months ago
- MCP server implementation for NIST Cybersecurity Framework 2.0☆50Updated last month
- Minimizing rework for governance activities.☆36Updated this week
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆28Updated last month
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- ☆38Updated 3 weeks ago
- A hands-on, real-world GRC lab series built for beginners and curious pros alike. No PDFs. No gatekeeping. Just practical labs for unders…☆88Updated 2 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆143Updated last week
- Factor Analysis of Information Risk (FAIR) tool developed in R☆22Updated 7 years ago
- A collection of security related user stories compatible with NIST Special Publication 800-53☆37Updated 8 years ago
- ☆12Updated 2 years ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆959Updated 4 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 3 months ago
- NIST CSF Maturity Toolkit☆114Updated 7 months ago
- Config files for my GitHub profile.☆418Updated last week
- Continuous Audit Metrics☆27Updated last year
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆104Updated 3 weeks ago
- Any good cybersecurity program needs the policies and plans to get it started and give it direction. This is our take on a starting point☆19Updated 2 years ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Updated last month
- NIST 800-53 Baseline Configuration Tool☆14Updated last year
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆26Updated 3 weeks ago
- NIST SP 800-53 Rev 5 as Data☆23Updated 5 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆390Updated last year
- ☆37Updated 2 years ago
- Compliance Scorecard OSCAL Policy Standards☆23Updated last year
- NIST SP 800-53 content and other OSCAL content examples☆403Updated 3 weeks ago
- One Conference 2024☆111Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆260Updated 6 months ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆102Updated last year