ministryofjustice / security-guidanceLinks
Security guidance from the MOJ Digital & Technology Cybersecurity team
☆21Updated 2 weeks ago
Alternatives and similar repositories for security-guidance
Users that are interested in security-guidance are comparing it to the libraries listed below
Sorting:
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆31Updated 5 years ago
- ☆14Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last month
- FedRAMP Requests For Comments (RFCs)☆18Updated 3 weeks ago
- honest.security microsite☆40Updated 2 months ago
- cloud.gov security policies and procedures☆25Updated last month
- dangerzone has moved to https://github.com/freedomofpress/dangerzone☆40Updated 3 years ago
- Certificate Revocation List monitor☆43Updated 11 months ago
- An Incident Management Process / Post Mortem Template☆33Updated 6 years ago
- On Premise Installer☆14Updated 4 years ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated 2 weeks ago
- Documentation for the Internet Society's Open Standards Everywhere project☆69Updated 3 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 3 years ago
- ShitHub is a collaborative platform, created to check your own and/or foreign code for security vulnerabilitys and design issues.☆11Updated 7 years ago
- DevSecOps Guide, located devsecops.pagerduty.com☆13Updated 3 years ago
- Security Blueprint for Startups☆39Updated 5 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Nginx Baseline - InSpec Profile☆10Updated 3 years ago
- ☆21Updated last year
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Pritunl Zero bastion server☆12Updated 9 months ago
- CISOfy Handbook☆32Updated 8 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Updated last month
- ☆32Updated 2 years ago
- A simple Dynamic DNS source for octoDNS.☆18Updated 2 weeks ago
- Utility for unattended remote unlock of LUKS encrypted LVM using SSH and cryptsetup☆22Updated 6 years ago
- A curated list of Cloud Security techniques and tools☆29Updated 2 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Chrome extension that disables WebBluetooth☆14Updated 7 years ago
- Publish a machine readable version of the ARS standards to facilitate compliance as code efforts.☆23Updated last year