gjyoung1974 / soc2-policy-templates
Template SOC2 Policy Authority - documentation pipeline
☆96Updated 3 years ago
Related projects: ⓘ
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆81Updated 3 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆137Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆282Updated 3 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated 8 months ago
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking. https://gapps…☆403Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆122Updated 3 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆147Updated 4 months ago
- A list of cloud security tools and vendors.☆124Updated last week
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆22Updated 3 weeks ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆143Updated 6 months ago
- AWS honey token manager☆78Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆181Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆107Updated 2 months ago
- ☆344Updated 5 months ago
- ☆234Updated 3 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆169Updated 3 weeks ago
- Open source templates you can use to bootstrap your security programs☆327Updated this week
- The SOCless automation framework☆131Updated 3 weeks ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆93Updated 2 months ago
- Lambda function that streamlines containment of an AWS account compromise☆316Updated 9 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- This is a companion to the Security Engineer Questions☆196Updated 9 months ago
- Documenting your Threat Models with HCL☆397Updated 2 weeks ago
- Continuous Audit Metrics☆24Updated 3 months ago
- Generate datasets of cloud audit logs for common attacks☆158Updated last month
- ☆108Updated last month
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆148Updated 11 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆101Updated this week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆107Updated 2 weeks ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆91Updated 3 weeks ago