brianwifaneye / NIST-CSF
NIST CyberSecurity Framework management tool
☆161Updated 3 years ago
Alternatives and similar repositories for NIST-CSF:
Users that are interested in NIST-CSF are comparing it to the libraries listed below
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 4 months ago
- ☆131Updated 11 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆112Updated this week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆382Updated 11 months ago
- Cyber Incident Response Team Playbook Battle Cards☆373Updated 10 months ago
- ☆93Updated 2 years ago
- Controls Assessment Specification☆69Updated last week
- Creating a resource to help build and manage an Insider Threat program.☆66Updated last month
- ☆42Updated 2 years ago
- Cybersecurity Incident Response Plan☆89Updated 4 years ago
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆198Updated 4 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆490Updated 11 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 4 months ago
- ☆44Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Splunk code (SPL) for serious threat hunters and detection engineers.☆273Updated last year
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 4 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆142Updated 6 months ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 8 months ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆216Updated last month
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 9 months ago
- CASCADE Server☆266Updated 2 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Home for Splunk security datasets.☆123Updated 4 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆80Updated 4 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- A list of Splunk queries that I've collected and used over time.☆75Updated 4 years ago