nathanpocock / I-ISMSLinks
Industrial Information Security Management System
☆115Updated 5 years ago
Alternatives and similar repositories for I-ISMS
Users that are interested in I-ISMS are comparing it to the libraries listed below
Sorting:
- Lists of products useful for ICS security☆107Updated last year
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆89Updated last week
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- A curated list of resources that I recommend when asked about how to learn about Industrial Control Systems Cyber Security.☆196Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Industrial Control Systems Network Protocol Parsers☆188Updated 4 months ago
- A curated list of awesome things related to TheHive & Cortex☆184Updated 4 years ago
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆188Updated 5 months ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆100Updated last month
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated 2 weeks ago
- Zeek Log Cheatsheets☆302Updated 5 months ago
- PowerShell script for hardening Siemens Simatic PCS 7 servers☆56Updated 5 years ago
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆206Updated 9 months ago
- A Low-cost ICS Security Testbed for Education and Research☆118Updated last year
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189Updated 4 years ago
- MITRE Caldera™ for OT Plugins & Capabilities☆232Updated last month
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆121Updated 8 months ago
- Cybersecurity Incident Response Plan☆109Updated 5 years ago
- ☆73Updated 9 months ago
- ICS security resources☆123Updated 8 months ago
- Cyber Incident Response Team Playbook Battle Cards☆426Updated last year
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Updated last week
- SIEGMA - Transform Sigma rules into SIEM consumables☆158Updated 10 months ago
- ☆94Updated this week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆38Updated 5 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆128Updated 9 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆241Updated last year