gauntlt / gauntlt-dockerLinks
the docker for gauntlt
☆87Updated 2 years ago
Alternatives and similar repositories for gauntlt-docker
Users that are interested in gauntlt-docker are comparing it to the libraries listed below
Sorting:
- example code and lab environment for the the Security Testing class in the Lynda and LinkedIn Learning library☆84Updated 6 years ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Updated 7 years ago
- This repository contains information about DevSecOps and how to get involved in this community effort.☆148Updated 7 years ago
- a ruggedization framework that embodies the principle "be mean to your code"☆995Updated 3 years ago
- CIS Docker Benchmark - InSpec Profile☆524Updated 2 years ago
- CIS Kubernetes Benchmark - InSpec Profile☆309Updated last year
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆280Updated this week
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Updated 7 years ago
- Application Security Automation☆525Updated 2 years ago
- Ready to use images of Zap and Glue, especially for CI integration.☆35Updated 6 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Updated 4 years ago
- threatspec - continuous threat modeling, through code☆374Updated 5 years ago
- Repo to hold mapping of user-security-stories☆120Updated 7 years ago
- SAMM stands for Software Assurance Maturity Model.☆397Updated 3 years ago
- An open source, online threat modelling tool from OWASP☆484Updated 6 months ago
- Container Security Verification Standard☆58Updated 6 years ago
- Helm chart to deploy Trend Micro Deep Security Smart Check.☆45Updated last year
- ☆557Updated last week
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆164Updated 2 years ago
- Code examples for the AWS Security Blog post: How to use CI/CD to deploy and configure AWS security services with Terraform☆97Updated 4 years ago
- ☆108Updated 2 years ago
- A Continuous Threat Modeling methodology☆325Updated 3 years ago
- Learning Activities for the AWS Security Specialty Course☆83Updated 6 years ago
- Example detection of compromise credentials in AWS☆122Updated 7 years ago
- ChaoSlingr: Introducing Security into Chaos Testing☆69Updated 6 years ago
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- A continuous security pipeline demo for the AWS DevSecOps Workshop.☆45Updated 6 years ago
- Example of using Gauge and OWASP ZAP for test automation☆11Updated 6 years ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆55Updated 2 years ago
- InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark☆77Updated last month