cisagov / cybersecurity-performance-goals
CISA's space for collaboration on the Cybersecurity Performance Goals.
☆72Updated last week
Alternatives and similar repositories for cybersecurity-performance-goals:
Users that are interested in cybersecurity-performance-goals are comparing it to the libraries listed below
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 5 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆211Updated this week
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆87Updated 3 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆148Updated this week
- NIST CSF Maturity Toolkit☆37Updated last month
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- InsightVM helpful SQL queries☆64Updated last month
- MISP to Sentinel integration☆63Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆44Updated last week
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆112Updated this week
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 10 months ago
- Tools for simulating threats☆183Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- ☆42Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 3 weeks ago
- ☆117Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 7 months ago
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated last year
- OCSF Documentation☆127Updated last month
- NIST CyberSecurity Framework management tool☆162Updated 3 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆235Updated 2 weeks ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 5 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆110Updated 2 months ago
- ☆93Updated 2 years ago
- Security Scripts and Sources for daily usage.☆56Updated 2 weeks ago
- Cyber Incident Response Team Playbook Battle Cards☆373Updated 10 months ago
- Rules generated from our investigations.☆193Updated last week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆60Updated last week