jonathanristo / VMMM-self-assessment-toolLinks
A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).
☆41Updated 6 months ago
Alternatives and similar repositories for VMMM-self-assessment-tool
Users that are interested in VMMM-self-assessment-tool are comparing it to the libraries listed below
Sorting:
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆81Updated last week
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆77Updated last year
- NIST CSF Maturity Toolkit☆100Updated 3 months ago
- Generate a matrix based on an inventory of InfoSec tools☆23Updated last year
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆132Updated this week
- A Secure Controls Framework (SCF) Power BI App☆22Updated 10 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- Automating Security Detection Engineering, published by Packt☆62Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- Anvilogic Forge☆107Updated 2 weeks ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆119Updated 3 months ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆88Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆172Updated 3 weeks ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆390Updated last year
- One Conference 2024☆110Updated 11 months ago
- Security Scripts and Sources for daily usage.☆65Updated 3 months ago
- ☆44Updated last year
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆149Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 9 months ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆16Updated 8 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆253Updated 2 months ago
- ☆146Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- ☆12Updated 3 months ago