devsecops / wardley-maps
A repository for wardley maps related to security topics.
☆47Updated 7 years ago
Alternatives and similar repositories for wardley-maps:
Users that are interested in wardley-maps are comparing it to the libraries listed below
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆46Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆56Updated 6 years ago
- AppSecPipeline Specification for DevOps automation.☆38Updated 2 years ago
- OWASP Threat Dragon with Gitlab Integration☆24Updated 7 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆177Updated 6 years ago
- Vendor Security Model Contract☆97Updated 2 years ago
- ☆20Updated 6 years ago
- ☆61Updated last year
- ☆13Updated 6 years ago
- ☆82Updated 5 years ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- Systematic Universal Security Testing Orchestration☆37Updated 2 years ago
- The original AWS security enforcer™☆59Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆62Updated 5 years ago
- Repo to hold mapping of user-security-stories☆114Updated 6 years ago
- This script is used to generate some basic detections of the aws security services☆71Updated 2 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆56Updated 5 years ago
- ☆36Updated 3 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆45Updated 10 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆28Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆67Updated 4 years ago
- Tools for AWS forensics☆64Updated 8 years ago
- Assess certain AWS network configurations☆11Updated 6 years ago
- Threat Modeling Manifesto☆27Updated 4 months ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆16Updated 8 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 5 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆51Updated 5 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆71Updated 3 years ago