deepanshusood / SANS-Security-Policy-Templates
SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT security practices.
☆37Updated 3 years ago
Alternatives and similar repositories for SANS-Security-Policy-Templates:
Users that are interested in SANS-Security-Policy-Templates are comparing it to the libraries listed below
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 7 months ago
- ☆44Updated last year
- MITRE ATT&CK Based App in Power BI☆14Updated 11 months ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆52Updated last year
- Cybersecurity Incident Response Plan☆88Updated 4 years ago
- A Secure Controls Framework (SCF) Power BI App☆16Updated 3 months ago
- ☆42Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆14Updated 2 weeks ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆39Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆67Updated 4 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆67Updated 9 months ago
- A tool that allows you to document and assess any security automation in your SOC☆45Updated 3 months ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆116Updated 6 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 4 months ago
- NIST CyberSecurity Framework management tool☆161Updated 3 years ago
- Controls Assessment Specification☆69Updated 8 months ago
- Practical Threat Detection Engineering, Published by Packt☆65Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆84Updated last year
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 11 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆15Updated 2 weeks ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆51Updated 2 years ago
- ☆117Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- ☆14Updated 2 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆23Updated 3 years ago