ajy0127 / aws_automated_access_reviewLinks
AWS Access Review is a comprehensive, zero-configuration security assessment tool that automatically evaluates your AWS environment for potential security risks and compliance gaps.
☆17Updated 6 months ago
Alternatives and similar repositories for aws_automated_access_review
Users that are interested in aws_automated_access_review are comparing it to the libraries listed below
Sorting:
- This GRC Portfolio Hub is my initiative to empower GRC professionals in showcasing their practical AWS GRC engineering implementation ski…☆27Updated 2 months ago
- Minimizing rework for governance activities.☆25Updated this week
- Factor Analysis of Information Risk (FAIR) model written in Python. Managed and maintained by Hive Systems☆102Updated 3 months ago
- A python module to allow for easy integration with the Lacework APIs.☆18Updated last year
- ☆37Updated last year
- Built-in Panther detection rules and policies☆419Updated this week
- Open FAIR Course☆13Updated 5 years ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆22Updated 7 years ago
- A hands-on, real-world GRC lab series built for beginners and curious pros alike. No PDFs. No gatekeeping. Just practical labs for unders…☆72Updated 2 months ago
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆134Updated last week
- MCP server implementation for NIST Cybersecurity Framework 2.0☆29Updated last month
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 6 months ago
- A collection of security related user stories compatible with NIST Special Publication 800-53☆37Updated 8 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- OWASP Foundation Web Respository☆25Updated this week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆73Updated last week
- ☆395Updated 2 years ago
- ☆19Updated 2 months ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆183Updated 3 months ago
- NIST SP 800-53 content and other OSCAL content examples☆386Updated this week
- Python installable command line utiltity for mitigation of host and key compromises.☆348Updated 4 years ago
- VERIS Community Database☆642Updated last month
- NIST SP 800-53 Rev 5 as Data☆23Updated 5 years ago
- FedRAMP Automation☆344Updated 6 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆327Updated last year
- Documentation on the Cyber Defense Matrix☆25Updated 2 years ago
- KEV EPSS Data☆27Updated this week
- ☆11Updated last year
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆31Updated 2 years ago