ocsf / governance
☆32Updated 5 months ago
Alternatives and similar repositories for governance:
Users that are interested in governance are comparing it to the libraries listed below
- OCSF Documentation☆129Updated 2 months ago
- OCSF Schema WEB Server☆50Updated this week
- ☆73Updated last month
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆107Updated 6 months ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆81Updated this week
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆59Updated 4 months ago
- ☆21Updated 3 weeks ago
- Continuous Audit Metrics☆26Updated 10 months ago
- Anvilogic Forge☆101Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆53Updated last year
- Add a layer of active defense to your cloud applications.☆90Updated 3 weeks ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆74Updated 3 weeks ago
- ☆258Updated 4 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆21Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Updated this week
- Cross cloud workload identity research and workshops☆36Updated 3 weeks ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- ☆100Updated 2 weeks ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆144Updated 10 months ago
- Controls Assessment Specification☆69Updated 2 weeks ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆92Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated 3 weeks ago
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆90Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆228Updated 3 weeks ago