gjyoung1974 / soc2-policy-templates
Template SOC2 Policy Authority - documentation pipeline
☆110Updated 4 years ago
Alternatives and similar repositories for soc2-policy-templates
Users that are interested in soc2-policy-templates are comparing it to the libraries listed below
Sorting:
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 7 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 10 months ago
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆36Updated last month
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 5 months ago
- Documenting SOC 2 tools and processes☆79Updated 3 years ago
- AI featured threat modeling and security review action☆43Updated 6 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆76Updated last week
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking. https://gapps…☆536Updated 2 weeks ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆84Updated 11 months ago
- A Software as a Service (SaaS) log collection framework.☆168Updated last week
- A list of cloud security tools and vendors.☆164Updated 8 months ago
- AWS honey token manager☆87Updated 9 months ago
- A Secure Controls Framework (SCF) Power BI App☆17Updated 6 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆169Updated 3 weeks ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆110Updated 7 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 5 months ago
- ☆25Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated 11 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆233Updated last week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- ☆66Updated this week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆27Updated this week
- Continuous Audit Metrics☆26Updated 11 months ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆77Updated last year
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆118Updated 10 months ago
- Generate security policies and documents based on KPNs templates.☆38Updated 5 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆187Updated 8 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆50Updated last month