Template SOC2 Policy Authority - documentation pipeline
☆138Sep 23, 2020Updated 5 years ago
Alternatives and similar repositories for soc2-policy-templates
Users that are interested in soc2-policy-templates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compliance automation framework, focused on SOC2☆1,532Jul 21, 2022Updated 3 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆345Feb 19, 2026Updated 2 months ago
- Documenting SOC 2 tools and processes☆105Jan 19, 2022Updated 4 years ago
- Archive of the Information Secuity policy documentation for Greater Manchester CHC that conforms to ISO27001☆14Apr 19, 2020Updated 6 years ago
- A tool to audit Erlang & Elixir dependencies, to make sure your ✨ gleam projects really sparkle!☆24Apr 15, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆105Jun 14, 2021Updated 4 years ago
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆665Apr 16, 2026Updated 2 weeks ago
- SimpleRisk Docker Repository☆38Apr 25, 2026Updated last week
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆58Oct 22, 2021Updated 4 years ago
- A small app to make it easy to administrate simple firewall configurations.☆27Feb 16, 2026Updated 2 months ago
- Run AI coding agents in secure, isolated microVMs. Sub-125ms boot times, real hardware isolation.☆45Apr 24, 2026Updated last week
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆12Jun 20, 2020Updated 5 years ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- WordPress, security, speed, backuping, webhosting, and tuned Apache2.4 server with php-fpm, chroot and other stuff.☆11Apr 21, 2020Updated 6 years ago
- Powershell tools to manage an manipulate STIGs, SCAP scans, XCCDFs, and CLKs☆15Nov 6, 2023Updated 2 years ago
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆19Aug 26, 2021Updated 4 years ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆87Feb 19, 2026Updated 2 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Open source templates you can use to bootstrap your security programs☆901Dec 28, 2025Updated 4 months ago
- NIST CSF Maturity Toolkit☆119Jun 6, 2025Updated 10 months ago
- A security tool designed to perform thorough scans on a target using OpenVAS, Zap, and Nexpose. It seamlessly consolidates and integrates…☆46Updated this week
- Semantic Observability for UNIX Systems - A lightweight C-based system prober with AI-powered analysis☆73Mar 28, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Generated a compliance checklist report, asset register and risk register. Implemented policies on various controls of ISO27001:2013 stan…☆30May 31, 2021Updated 4 years ago
- Compliance Scorecard OSCAL Policy Standards☆26May 6, 2024Updated last year
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆4,005Updated this week
- Example Splunk Alert Scripts☆20Mar 20, 2015Updated 11 years ago
- one-stop resource for all things offensive security.☆179Apr 21, 2026Updated last week
- CA Issuers Monitor (Authority Info Access)☆14Mar 8, 2023Updated 3 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- ☆95Jul 17, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆156Dec 2, 2025Updated 5 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Permission fatigue is a real problem. Sandbox escape is a real problem. yoloAI solves it.☆72Apr 22, 2026Updated last week
- Sechead is a powerful security tool developed in Python that allows users to audit the security headers of any website. With Sechead, use…☆13May 22, 2023Updated 2 years ago
- Stanford CoreNLP NER addon for Apache Tika's NamerEntityParser☆13Feb 26, 2022Updated 4 years ago
- ☆15Mar 26, 2026Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated last week