chughes757 / FederalZeroTrustLinks
A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.
☆40Updated 3 years ago
Alternatives and similar repositories for FederalZeroTrust
Users that are interested in FederalZeroTrust are comparing it to the libraries listed below
Sorting:
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆48Updated last year
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆44Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆52Updated 3 months ago
- Coalfire AWS RAMP/pak Reference Architecture☆36Updated 9 months ago
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆59Updated 2 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- ☆41Updated 3 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Cross cloud workload identity research and workshops☆39Updated last month
- ☆16Updated 2 years ago
- Various deployments of the OSCAL editor☆46Updated 10 months ago
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 8 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated last month
- https://breaches.cloud☆40Updated 8 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆113Updated last week
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- This repository is a collection of resources to help facilitate compliance innovation utilizing Cloud, DevSecOps and Software Factory tec…☆73Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated last month
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 2 years ago
- Docker build of GovReady☆14Updated last year
- Demo setup for compliance-trestle☆34Updated 3 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆97Updated last year
- NIST 800-53 Baseline Configuration Tool☆13Updated 9 months ago
- Cloud deployment size calculation utilities☆20Updated last month
- Compares and analyzes GCP IAM roles.☆77Updated 3 months ago