gjyoung1974 / soc2-policy-templatesLinks
Template SOC2 Policy Authority - documentation pipeline
☆113Updated 4 years ago
Alternatives and similar repositories for soc2-policy-templates
Users that are interested in soc2-policy-templates are comparing it to the libraries listed below
Sorting:
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆38Updated 3 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆316Updated last year
- Documenting SOC 2 tools and processes☆80Updated 3 years ago
- AWS honey token manager☆87Updated 10 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆89Updated last month
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆149Updated 7 months ago
- A Software as a Service (SaaS) log collection framework.☆173Updated last week
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated last year
- A list of cloud security tools and vendors.☆168Updated 9 months ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆84Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆41Updated 3 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆120Updated 11 months ago
- ☆261Updated 7 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆113Updated last week
- A Secure Controls Framework (SCF) Power BI App☆21Updated 7 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆172Updated 7 months ago
- The SOCless automation framework☆140Updated 4 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆204Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆166Updated 2 months ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆39Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated last month
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆173Updated 2 months ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆92Updated last month
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆166Updated last year
- A multi-vault secret injection tool for safely injecting secrets into app environment☆126Updated last week
- AI featured threat modeling and security review action☆44Updated 7 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 10 months ago