chughes29 / DoD-Federal-Government-Cloud-Computing-Resources
A collection of DoD and Federal Government Cloud Computing Resources
☆48Updated 4 years ago
Alternatives and similar repositories for DoD-Federal-Government-Cloud-Computing-Resources:
Users that are interested in DoD-Federal-Government-Cloud-Computing-Resources are comparing it to the libraries listed below
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated last year
- ☆12Updated 3 years ago
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆39Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated last month
- ☆112Updated 3 months ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆53Updated last year
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- CloudSplaining on AWS Managed Policies☆41Updated this week
- OWASP Foundation Web Respository☆23Updated last month
- Controls Assessment Specification☆69Updated 2 weeks ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆186Updated 7 months ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆99Updated last year
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆142Updated last year
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆71Updated this week
- GCP CSPM using Google Sheets☆35Updated last week
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 7 months ago
- Cross cloud workload identity research and workshops☆36Updated 3 weeks ago
- ☆116Updated 3 weeks ago
- SkyWrapper helps to discover suspicious creation forms and uses of temporary tokens in AWS☆106Updated 4 years ago
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆40Updated last week
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆68Updated 3 years ago
- ☆41Updated last year
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- OWASP Foundation Web Respository☆55Updated last year