counteractive / security-controls
☆43Updated last year
Related projects ⓘ
Alternatives and complementary repositories for security-controls
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Controls Assessment Specification☆65Updated 5 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated last month
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆26Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- A collection of awesome security controls mapping for solutions across frameworks.☆52Updated 4 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 7 months ago
- MITRE ATT&CK Based App in Power BI☆12Updated 8 months ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- ☆53Updated 3 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Notes on managing and coordinating the response to major cyber incidents☆39Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆36Updated 3 months ago
- NIST CyberSecurity Framework management tool☆157Updated 2 years ago
- ☆131Updated 8 months ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆29Updated 3 years ago
- ☆114Updated last year
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆92Updated 2 years ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆26Updated 7 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆115Updated 4 years ago
- A tool that allows you to document and assess any security automation in your SOC☆41Updated 3 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆49Updated 2 years ago