cisagov / cybersecurity-performance-goals
CISA's space for collaboration on the Cybersecurity Performance Goals.
☆74Updated last month
Alternatives and similar repositories for cybersecurity-performance-goals
Users that are interested in cybersecurity-performance-goals are comparing it to the libraries listed below
Sorting:
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆88Updated 4 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆225Updated this week
- InsightVM helpful SQL queries☆64Updated 2 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- WA Cyber Security Unit (DGOV Technical) site☆37Updated last week
- ☆94Updated 2 years ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆143Updated 8 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- Controls Assessment Specification☆70Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆39Updated 2 months ago
- ☆83Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- NIST CyberSecurity Framework management tool☆163Updated 3 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆162Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 6 months ago
- Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.☆35Updated last year
- Conference presentations☆47Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 11 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆150Updated last week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆77Updated last month
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆123Updated 3 weeks ago
- Security Scripts and Sources for daily usage.☆59Updated last month
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Repository of SentinelOne Deep Visibility queries.☆127Updated 3 years ago
- Manage Windows auditing policies.☆35Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆233Updated last week
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆53Updated last year
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 4 years ago