nsacyber / Mitigating-Obsolete-TLS
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
☆272Updated 3 years ago
Alternatives and similar repositories for Mitigating-Obsolete-TLS:
Users that are interested in Mitigating-Obsolete-TLS are comparing it to the libraries listed below
- ☆436Updated 3 years ago
- CISA's catalog of bad practices that are exceptionally risky.☆204Updated 2 months ago
- A set of guidelines and best practices for an awesome engineering team☆222Updated last week
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,420Updated 2 years ago
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆279Updated 2 years ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆221Updated 9 months ago
- External monitoring for organization assets☆385Updated 7 months ago
- This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.☆898Updated this week
- Creating a hardened "Blue Forest" with Server 2016/2019 Domain Controllers☆263Updated 4 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆379Updated 9 months ago
- A site for CISA directives☆157Updated 7 months ago
- Contact: CRT@crowdstrike.com☆710Updated last year
- OCSF Documentation☆122Updated last month
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆276Updated 3 years ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆130Updated last week
- An API and client for managing STIG assessments☆125Updated this week
- ☆617Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆373Updated last week
- ☆354Updated 2 years ago
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- Logging Made Easy☆707Updated last year
- OpenSSF Security Tooling Working Group☆304Updated 8 months ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆488Updated 9 months ago
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆599Updated 5 months ago
- Transform Linux Audit logs for SIEM usage☆733Updated this week
- DShield Raspberry Pi Sensor☆455Updated 5 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆70Updated 3 months ago
- SCAP Scanner And Tailoring Graphical User Interface☆228Updated 11 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆448Updated last year