chughes757 / SecureSoftwareSupplyChain
This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.
☆137Updated 2 years ago
Alternatives and similar repositories for SecureSoftwareSupplyChain:
Users that are interested in SecureSoftwareSupplyChain are comparing it to the libraries listed below
- A reading list for software supply-chain security.☆362Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆171Updated 4 months ago
- Documenting your Threat Models with HCL☆426Updated 7 months ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆188Updated last year
- A tool to check the security settings of Github Organizations.☆71Updated last year
- ☆234Updated last week
- Generate a score for your sbom to understand if it will actually be useful.☆228Updated 8 months ago
- Trivy's misconfiguration scanning engine☆218Updated 2 months ago
- Our objective is to enable open source maintainers, contributors and end-users to understand and make decisions on the provenance of the …☆180Updated last year
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆186Updated 7 months ago
- Open Source Software Secure Supply Chain Framework☆236Updated 2 years ago
- Compares and analyzes GCP IAM roles.☆77Updated last month
- The SOCless automation framework☆139Updated 2 months ago
- GCP CSPM using Google Sheets☆35Updated last week
- Open source compliance tool for development platforms.☆286Updated last year
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆336Updated last week
- This repo. is archived. The utility is now at: https://github.com/CycloneDX/sbom-utility☆60Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆99Updated last year
- IAM-Deescalate helps mitigate privilege escalation risk in AWS identity and access management (IAM)☆98Updated 2 years ago
- Open Cloud Security Posture Management Engine☆339Updated 3 years ago
- OWASP Foundation Web Respository☆82Updated 2 months ago
- ☆63Updated 2 years ago
- OpenVEX Specification☆144Updated 2 weeks ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆92Updated 3 weeks ago
- ☆116Updated 3 weeks ago
- Technical Advisory Council☆121Updated this week
- ☆112Updated 3 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago