cisagov / cybersecurity-performance-goalsLinks
CISA's space for collaboration on the Cybersecurity Performance Goals.
☆75Updated 6 months ago
Alternatives and similar repositories for cybersecurity-performance-goals
Users that are interested in cybersecurity-performance-goals are comparing it to the libraries listed below
Sorting:
- ☆77Updated 2 years ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆261Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆163Updated last week
- CISA's catalog of bad practices that are exceptionally risky.☆210Updated this week
- InsightVM helpful SQL queries☆71Updated 7 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆73Updated 11 months ago
- Controls Assessment Specification☆70Updated 6 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆149Updated last week
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆146Updated 3 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆126Updated 4 years ago
- ☆95Updated last week
- Conference presentations☆59Updated last month
- OCSF Documentation☆141Updated 2 weeks ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 11 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 11 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆256Updated 3 months ago
- A site for CISA directives☆166Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆116Updated 6 months ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated last week
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated 2 weeks ago
- ☆87Updated 7 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 7 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆98Updated 9 months ago
- ☆119Updated 2 years ago
- Awesome Incident Response☆281Updated last week
- WA Cyber Security Unit (DGOV Technical) site☆43Updated this week
- CISA CSAF Security Advisories☆83Updated last week