deepanshusood / SANS-Security-Policy-Templates
SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT security practices.
☆29Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for SANS-Security-Policy-Templates
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- Cybersecurity Incident Response Plan☆87Updated 4 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆66Updated 4 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- ☆15Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆45Updated last year
- ☆41Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆39Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆36Updated 4 years ago
- ☆14Updated last year
- A curated list of awesome threat detection and hunting resources☆16Updated 6 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated last month
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆109Updated 4 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆51Updated last year
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆51Updated 2 weeks ago
- List of helpful publicly available CrowdStrike material.☆17Updated last week
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆12Updated 7 months ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 weeks ago
- MITRE ATT&CK Based App in Power BI☆12Updated 8 months ago
- ☆43Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆41Updated 3 weeks ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆14Updated 2 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆97Updated this week
- User Feedback Space of #MitreAssistant☆37Updated last year
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆38Updated 4 years ago
- A lab environment for learning about MSTICPy☆36Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆67Updated last year