dwyl / ISO-27001-2013-information-technology-securityLinks
Probably the most boring-but-necessary repo on GitHub. If you care about the security/privacy of your data...!
☆159Updated 8 years ago
Alternatives and similar repositories for ISO-27001-2013-information-technology-security
Users that are interested in ISO-27001-2013-information-technology-security are comparing it to the libraries listed below
Sorting:
- Repository for the Open Security Reference Architecture☆128Updated last month
- CSA Guidance☆217Updated 8 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆319Updated last year
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- This repository contains information about DevSecOps and how to get involved in this community effort.☆150Updated 6 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆282Updated last month
- Controls Assessment Specification☆70Updated 4 months ago
- An open source, self-service GRC tool to automate security assessments and compliance.☆192Updated 7 months ago
- The SOCless automation framework☆140Updated 5 months ago
- Repo to hold mapping of user-security-stories☆119Updated 6 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆102Updated 4 years ago
- Computer Aided Integration of Requirements and Information Security - Server☆164Updated 11 months ago
- The Secure Coding Framework☆266Updated 4 years ago
- Simple command line tool to check for compliance against CIS Benchmarks☆264Updated last year
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆162Updated 2 years ago
- a curated list of useful threat modeling resources☆137Updated last year
- Open Source Data Protection/Privacy Regulatory Mapping Project☆182Updated 2 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- A collection of DevSecOps reference architectures☆69Updated 4 years ago
- Awesome list of resources related to container security☆238Updated 8 months ago
- ☆48Updated 2 years ago
- Sample scan files for testing DefectDojo imports☆80Updated 6 months ago
- The Elevation of Privilege Threat Modeling Game☆334Updated last year
- SAMM stands for Software Assurance Maturity Model.☆396Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆64Updated 3 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- This project is about creating and publishing threat model examples.☆420Updated 3 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago