ocsf / governanceLinks
☆32Updated 10 months ago
Alternatives and similar repositories for governance
Users that are interested in governance are comparing it to the libraries listed below
Sorting:
- OCSF Documentation☆141Updated 3 weeks ago
- OCSF Schema☆730Updated this week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆263Updated last month
- ☆75Updated 6 months ago
- Add a layer of active defense to your cloud applications.☆95Updated 2 weeks ago
- Graph-based security analysis for everyone☆350Updated last year
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆164Updated this week
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆47Updated 2 months ago
- Lambda function that streamlines containment of an AWS account compromise☆344Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- Analyze assets authorization, who has access to what and how☆76Updated 7 months ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated 2 months ago
- ☆123Updated 3 weeks ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆149Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆116Updated 3 weeks ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆256Updated 3 months ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 6 months ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆183Updated 3 months ago
- cloudgrep is grep for cloud storage☆325Updated 7 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆334Updated 5 months ago
- A Software as a Service (SaaS) log collection framework.☆178Updated last week
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆24Updated 2 weeks ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆210Updated 7 months ago
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆52Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- Built-in Panther detection rules and policies☆419Updated this week
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆384Updated 2 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago