betagouv / anssi-nis2Links
Accompagner les organisations dans la compréhension et la mise en conformité à NIS 2
☆13Updated 2 weeks ago
Alternatives and similar repositories for anssi-nis2
Users that are interested in anssi-nis2 are comparing it to the libraries listed below
Sorting:
- répertoire de publication web public☆1Updated 2 weeks ago
- ☆161Updated 9 months ago
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆291Updated this week
- Outil de récupération automatique des données de l'Active Directory / Automated tool for dumping Active Directory data☆251Updated last month
- Ce kit pédagogique a pour but de présenter aux participants quelques enjeux de la cybersécurité et de découvrir les métiers qui y sont as…☆116Updated 10 months ago
- Outils ESD academy☆56Updated 3 years ago
- Mapping the information system / Cartographie du système d'information☆350Updated this week
- A user-friendly solution to transfer files through a physical diode using the Lidi utility, complete with data retention, file history, u…☆149Updated last month
- Guide journalisation Microsoft☆70Updated 11 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆733Updated 3 months ago
- Forensics artefact collection tool for systems running Microsoft Windows☆416Updated 3 months ago
- SwitchToOpen - The open source shift☆197Updated this week
- Protect your data in minutes !☆120Updated 8 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- USB virus cleaning station/gateway☆52Updated last month
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆579Updated this week
- Map tracking ransomware, by OCD World Watch team☆469Updated 4 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆332Updated last week
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- Repository contenant les aides-mémoires ESD academy☆19Updated 5 years ago
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆83Updated 3 months ago
- Hardening Active Directory version 2☆329Updated 4 months ago
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆83Updated last year
- A modular vulnerability scanner with automatic report generation capabilities.☆676Updated this week
- Epreuves de sélection de la TeamFR pour l'ECSC 2019.☆163Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆382Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆238Updated last week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆106Updated last week
- Kostenlose Prozessbeschreibungen☆12Updated last year
- CRY.ME (CRYptographic MEssaging application)☆169Updated 2 years ago