mikeprivette / ai-security-shared-responsibilityLinks
AI Security Shared Responsibility Model
☆85Updated 2 months ago
Alternatives and similar repositories for ai-security-shared-responsibility
Users that are interested in ai-security-shared-responsibility are comparing it to the libraries listed below
Sorting:
- One Conference 2024☆111Updated last year
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆98Updated last month
- ☆38Updated 11 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆212Updated last week
- NOVA: The Prompt Pattern Matching☆53Updated last month
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆101Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆79Updated last year
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆42Updated last week
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆34Updated 9 months ago
- ☆337Updated 2 months ago
- ☆43Updated last month
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆98Updated 6 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- Anvilogic Forge☆112Updated 2 months ago
- Curated resources, research, and tools for securing AI systems☆188Updated last week
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆133Updated 5 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆81Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated 2 years ago
- A full insecure kubernetes application for testing security tools☆90Updated last month
- ☆166Updated 2 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated this week
- Vulnerability impact analyzer that reduces false positives in SCA tools by performing intelligent code analysis. Uses agentic AI with ope…☆61Updated 9 months ago
- AI featured threat modeling and security review action☆45Updated last year
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆167Updated last month
- This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework☆29Updated 9 months ago
- ☆42Updated 11 months ago
- ☆193Updated 7 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago