cisagov / ScubaGogglesLinks
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
☆252Updated last week
Alternatives and similar repositories for ScubaGoggles
Users that are interested in ScubaGoggles are comparing it to the libraries listed below
Sorting:
- ☆261Updated 9 months ago
- Scripts to streamline the deployment and use of the CrowdStrike Falcon sensor☆181Updated 3 weeks ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆250Updated last month
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆95Updated 7 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆132Updated last week
- NIST CSF Maturity Toolkit☆70Updated 2 months ago
- CISA's catalog of bad practices that are exceptionally risky.☆209Updated 3 months ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 5 months ago
- This repository contains Community and Field contributed content for LogScale☆258Updated last week
- ☆144Updated 2 weeks ago
- OCSF Documentation☆137Updated 2 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆387Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- Discover for Cloud and Containers Azure☆29Updated this week
- InsightVM helpful SQL queries☆70Updated 6 months ago
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆932Updated last month
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆164Updated 5 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆663Updated last month
- Simple hunting script for suspicious M365 OAuth Apps☆291Updated 6 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆321Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆192Updated 10 months ago
- Awesome Incident Response☆278Updated last week
- WA Cyber Security Unit (DGOV Technical) site☆40Updated last week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆76Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆123Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆81Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 11 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆21Updated last month