gauntlt / gauntlt-docker
the docker for gauntlt
☆86Updated last year
Alternatives and similar repositories for gauntlt-docker:
Users that are interested in gauntlt-docker are comparing it to the libraries listed below
- example code and lab environment for the the Security Testing class in the Lynda and LinkedIn Learning library☆86Updated 5 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆189Updated 6 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆178Updated 6 years ago
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆275Updated 3 weeks ago
- threatspec - continuous threat modeling, through code☆340Updated 4 years ago
- This repository contains information about DevSecOps and how to get involved in this community effort.☆147Updated 5 years ago
- An application to assist in the organization and prioritization of software security activities.☆137Updated 3 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆982Updated 2 years ago
- A Continuous Threat Modeling methodology☆313Updated 2 years ago
- Application Security Automation☆526Updated last year
- Ready to use images of Zap and Glue, especially for CI integration.☆34Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆47Updated 8 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆159Updated last year
- Repo to hold mapping of user-security-stories☆114Updated 6 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆298Updated 5 months ago
- CIS Docker Benchmark - InSpec Profile☆493Updated last year
- SAMM stands for Software Assurance Maturity Model.☆398Updated 2 years ago
- ☆502Updated this week
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆96Updated 3 years ago
- Examples of integrating the Snyk CLI into a CI/CD system☆84Updated last month
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 6 years ago
- This project is about creating and publishing threat model examples.☆412Updated 3 years ago
- Helm chart to deploy Trend Micro Deep Security Smart Check.☆44Updated 9 months ago
- SEDATED® Project (Sensitive Enterprise Data Analyzer To Eliminate Disclosure)☆110Updated last year
- Container Security Verification Standard☆57Updated 5 years ago
- Security aspects of AWS products for the Security Specialist certification☆208Updated 2 years ago
- Security Champions Playbook v 2.1☆356Updated last year
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆323Updated 5 months ago