instacart / gadjitLinks
☆27Updated 4 months ago
Alternatives and similar repositories for gadjit
Users that are interested in gadjit are comparing it to the libraries listed below
Sorting:
- Documenting your Threat Models with HCL☆433Updated this week
- A consolidated series of structured data for cloud identity and access management systems, including datasets for AWS, Azure, and Google …☆291Updated this week
- ☆378Updated last year
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆626Updated this week
- Segment's Threat Modeling training for our engineers☆245Updated 4 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- Automate permissions to your cloud and critical applications.☆242Updated last year
- This is a companion to the Security Engineer Questions☆206Updated last year
- List of known AWS accounts☆236Updated last month
- boostsecurityio/poutine☆339Updated last week
- Audit log wall of shame.☆42Updated 2 months ago
- Kickstart and manage your AWS Organization via Terraform☆111Updated last month
- ☆222Updated last month
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 10 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆43Updated last week
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- Lambda function that streamlines containment of an AWS account compromise☆344Updated last year
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆264Updated 2 years ago
- SCP management tool☆134Updated last year
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- Shostack's 4 Question Frame for Threat Modeling☆144Updated last month
- ☆11Updated last year
- Built-in Panther detection rules and policies☆419Updated this week
- App that simplifies building decision trees to model adverse scenarios☆218Updated last year
- Example policies demonstrating how to implement a data perimeter on AWS.☆183Updated 3 weeks ago
- Evaluate source control (GitHub) security posture☆251Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆166Updated last week
- Terraform provider for Prisma Cloud Compute☆25Updated 4 months ago
- ☆375Updated last year
- Resource types that can be publicly exposed on AWS☆328Updated 3 years ago