cisagov / cybersecurity-performance-goals
CISA's space for collaboration on the Cybersecurity Performance Goals.
☆74Updated 3 weeks ago
Alternatives and similar repositories for cybersecurity-performance-goals:
Users that are interested in cybersecurity-performance-goals are comparing it to the libraries listed below
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆87Updated 3 months ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 11 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆218Updated this week
- WA Cyber Security Unit (DGOV Technical) site☆35Updated last week
- Dettectinator - The Python library to your DeTT&CT YAML files.☆111Updated 2 weeks ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- ☆83Updated last month
- InsightVM helpful SQL queries☆64Updated 2 months ago
- NIST CSF Maturity Toolkit☆37Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆71Updated 2 months ago
- ☆118Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆384Updated last year
- Controls Assessment Specification☆69Updated 3 weeks ago
- CISA's catalog of bad practices that are exceptionally risky.☆206Updated 2 weeks ago
- ☆93Updated 2 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆81Updated last year
- A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon☆201Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- NIST CyberSecurity Framework management tool☆162Updated 3 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆114Updated last week
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- ☆77Updated 2 years ago
- Tools for simulating threats☆183Updated last year
- Conference presentations☆47Updated last year
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆264Updated 7 months ago