mikeprivette / NIST-to-TechLinks
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
☆123Updated last year
Alternatives and similar repositories for NIST-to-Tech
Users that are interested in NIST-to-Tech are comparing it to the libraries listed below
Sorting:
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆253Updated 2 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆132Updated last week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- ☆119Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆46Updated 3 years ago
- ☆48Updated 2 years ago
- ☆77Updated 2 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆81Updated last week
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆40Updated 6 months ago
- Cybersecurity Incident Response Plan☆101Updated 4 years ago
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 7 months ago
- NIST CSF Maturity Toolkit☆100Updated 3 months ago
- A curated list of Awesome Security Challenges.☆196Updated 10 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆186Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆81Updated last week
- ☆88Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆78Updated last year
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- A tool that allows you to document and assess any security automation in your SOC☆47Updated 10 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated last year
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆95Updated 3 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center ’s Mappings Explorer project. See README below. This repository is k…☆390Updated last year
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆161Updated 4 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- External monitoring for organization assets☆412Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆46Updated last year
- This is a companion to the Security Engineer Questions☆204Updated last year