The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.
☆110Jan 16, 2024Updated 2 years ago
Alternatives and similar repositories for security-champion-framework
Users that are interested in security-champion-framework are comparing it to the libraries listed below
Sorting:
- Security Champions Playbook v 2.1☆392Sep 25, 2023Updated 2 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆15Oct 9, 2025Updated 4 months ago
- ☆124Nov 8, 2023Updated 2 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆53Nov 25, 2025Updated 3 months ago
- threatspec - continuous threat modeling, through code☆379Dec 30, 2020Updated 5 years ago
- A collection of DevSecOps reference architectures☆71Feb 7, 2021Updated 5 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 4 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- ☆20Jan 18, 2022Updated 4 years ago
- OWASP Foundation web repository☆35Updated this week
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- OWASP Foundation web repository☆52Dec 21, 2025Updated 2 months ago
- This project is about creating and publishing threat model examples.☆428Nov 10, 2021Updated 4 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- The Software Parts (SParts) lab delivers a Sawtooth-based ledger that provides both accountability and access to the open source componen…☆12Feb 20, 2020Updated 6 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Documenting your Threat Models with HCL☆453Feb 24, 2026Updated last week
- ☆563Updated this week
- ☆423Jan 18, 2023Updated 3 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,716Aug 2, 2024Updated last year
- OWASP Foundation Web Respository☆28Dec 5, 2025Updated 2 months ago
- OWASP Foundation Web Respository☆28Dec 22, 2025Updated 2 months ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Jul 9, 2025Updated 7 months ago
- ☆69Jul 18, 2025Updated 7 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆117Updated this week
- Threat matrix for CI/CD Pipeline☆759Jul 8, 2024Updated last year
- ☆16Jul 17, 2024Updated last year
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Agile Threat Modeling as Code☆13Jun 30, 2022Updated 3 years ago
- ☆12Aug 5, 2023Updated 2 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- TSLint rules for Angular☆18Nov 30, 2018Updated 7 years ago