nsacyber / Mitigating-Obsolete-TLSLinks
Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber
☆271Updated 4 years ago
Alternatives and similar repositories for Mitigating-Obsolete-TLS
Users that are interested in Mitigating-Obsolete-TLS are comparing it to the libraries listed below
Sorting:
- CISA's catalog of bad practices that are exceptionally risky.☆208Updated last month
- ☆436Updated 3 years ago
- Logging Made Easy☆712Updated last year
- A set of guidelines and best practices for an awesome engineering team☆242Updated last month
- DShield Raspberry Pi Sensor☆480Updated this week
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Provision a brand-new company with proper defaults in Windows, Offic365, and Azure☆607Updated 11 months ago
- Controls Assessment Specification☆70Updated 3 months ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆140Updated this week
- Security configuration is complex. With thousands of group policies available in Windows, choosing the “best” setting is difficult. It’s …☆285Updated 2 years ago
- CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your…☆101Updated 3 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆288Updated 3 years ago
- External monitoring for organization assets☆409Updated last year
- Logmira by Blumira has been created by Amanda Berlin as a helpful download of Microsoft Windows Domain Group Policy Object settings.☆60Updated 9 months ago
- Main MineMeld documentation repo☆380Updated 7 years ago
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆121Updated last year
- File Access Policy Daemon☆220Updated last month
- ☆561Updated 2 years ago
- Python Library for interfacing into Tenable's platform APIs☆382Updated last week
- Zeek Log Cheatsheets☆293Updated 2 years ago
- A site for CISA directives☆163Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 8 months ago
- Tools and scripts by Arctic Wolf☆68Updated last year
- ☆354Updated 3 years ago
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆229Updated this week
- Hashes for vulnerable LOG4J versions☆154Updated 3 years ago
- OCSF Documentation☆132Updated last month
- Vocabulary for Event Recording and Incident Sharing (VERIS)☆608Updated 3 months ago
- Search a filesystem for indicators of compromise (IoC).☆74Updated last month
- DevSec Windows Baseline - InSpec Profile☆226Updated 11 months ago