djschleen / devsecops-architecture-tools
A collection of diagramming tools to help create DevOps/DevSecOps reference architectures
☆67Updated last year
Alternatives and similar repositories for devsecops-architecture-tools:
Users that are interested in devsecops-architecture-tools are comparing it to the libraries listed below
- A collection of DevSecOps reference architectures☆67Updated 4 years ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆66Updated 9 months ago
- OWASP Foundation Web Respository☆55Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆31Updated 11 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 3 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- Sharing software supply chain security open source projects☆46Updated 2 years ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆40Updated 2 years ago
- OWASP Foundation Web Respository☆82Updated 2 months ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆58Updated last year
- ☆98Updated 3 weeks ago
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆68Updated 3 years ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆188Updated last year
- ☆16Updated 2 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆103Updated 4 months ago
- Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters u…☆32Updated 5 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- Repository for storing code for O'Reilly book☆33Updated last year
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆71Updated this week
- Cloud Security Posture security policies☆29Updated 6 months ago
- ☆12Updated 3 years ago
- CICD Using GitHub Action and Harness☆17Updated last year
- ☆19Updated 2 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆45Updated last year
- https://breaches.cloud☆38Updated 5 months ago
- ☆16Updated last year
- ☆41Updated last year
- Curated list of security tools☆64Updated last year
- Awesome AWS service control policies (SCPs)☆25Updated last month
- Quickly set up a ready to use development environment integrated with a multi-account CI/CD pipeline following security and DevOps best p…☆50Updated last year