chughes29 / DoD-Federal-Government-Cloud-Computing-ResourcesLinks
A collection of DoD and Federal Government Cloud Computing Resources
☆48Updated 4 years ago
Alternatives and similar repositories for DoD-Federal-Government-Cloud-Computing-Resources
Users that are interested in DoD-Federal-Government-Cloud-Computing-Resources are comparing it to the libraries listed below
Sorting:
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated 5 months ago
- OWASP Foundation Web Respository☆56Updated 2 weeks ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- CloudSplaining on AWS Managed Policies☆44Updated last month
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- A collection of DevSecOps reference architectures☆70Updated 4 years ago
- Take automated actions against threats and vulnerabilities.☆215Updated 2 years ago
- Coalfire AWS RAMP/pak Reference Architecture☆37Updated last year
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆59Updated 6 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆42Updated 3 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated 2 months ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆158Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated 5 months ago
- ☆12Updated 4 years ago
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆104Updated 2 years ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- This repository will teach you have to do my talk "Pushing Left, Like a Boss".☆70Updated 3 years ago
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- ☆115Updated 2 months ago
- GCP Auto Remediation Suite for High Risk Events☆43Updated 4 years ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆78Updated this week
- List of vendors that do not allow IMDSv2 enforcement☆143Updated last year
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Like the unix tree command but for GCP Org Heirarchy☆27Updated 4 years ago