mitre / heimdall2Links
Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.
☆238Updated last week
Alternatives and similar repositories for heimdall2
Users that are interested in heimdall2 are comparing it to the libraries listed below
Sorting:
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- A web application to streamline the development of STIGs from SRGs☆80Updated this week
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆148Updated 2 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 7 months ago
- Controls Assessment Specification☆70Updated 6 months ago
- A command-line and ruby API of utilities, converters and tools for creating, converting and processing security baseline formats, results…☆94Updated last year
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆184Updated 4 months ago
- A ComplianceAsCode blog☆28Updated last month
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆45Updated 5 years ago
- Various deployments of the OSCAL editor☆47Updated last year
- Tools for the OSCAL project☆36Updated 2 years ago
- An open source, self-service GRC tool to automate security assessments and compliance.☆194Updated 10 months ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- An opinionated tooling platform for managing compliance as code, using continuous integration and NIST's OSCAL standard.☆208Updated last week
- Stakeholder-Specific Vulnerability Categorization☆166Updated last week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- ☆187Updated 3 weeks ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Updated 2 weeks ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆78Updated this week
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- NIST SP 800-53 content and other OSCAL content examples☆386Updated last week
- A Security Results Viewer for the web with storage, teams and history☆35Updated 2 years ago
- ☆123Updated this week
- Built-in Panther detection rules and policies☆421Updated this week
- Add a layer of active defense to your cloud applications.☆95Updated this week
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆116Updated last week
- Scripts to import OSCAL example content into the Neo4J graph database☆29Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆82Updated last week
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Updated last year