cisagov / cybersecurity-performance-goalsLinks
CISA's space for collaboration on the Cybersecurity Performance Goals.
☆75Updated 7 months ago
Alternatives and similar repositories for cybersecurity-performance-goals
Users that are interested in cybersecurity-performance-goals are comparing it to the libraries listed below
Sorting:
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆272Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated 3 weeks ago
- CISA CSAF Security Advisories☆90Updated this week
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- ☆96Updated 3 weeks ago
- ☆88Updated 8 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆76Updated last month
- CISA's catalog of bad practices that are exceptionally risky.☆211Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- Controls Assessment Specification☆70Updated 7 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 8 months ago
- ☆77Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Conference presentations☆60Updated 3 weeks ago
- OCSF Documentation☆144Updated last month
- A lab environment for learning about MSTICPy☆37Updated 2 years ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- MITRE ATT&CK Based App in Power BI☆17Updated last year
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Repo for Concierge AI dev work☆197Updated this week
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- CrowdStrike's Open Source Policy & Contribution Guide☆45Updated last month
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆146Updated 4 months ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆92Updated this week
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆46Updated 8 months ago
- Elevate your Security Operations Center's efficiency with Howler, the cutting-edge alert triage platform tailored for today's SOC demands…☆40Updated this week
- Microsoft Threat Intelligence☆195Updated last week