ocsf / governanceLinks
☆32Updated 8 months ago
Alternatives and similar repositories for governance
Users that are interested in governance are comparing it to the libraries listed below
Sorting:
- OCSF Documentation☆137Updated last month
- ☆263Updated 8 months ago
- OCSF Schema☆712Updated this week
- Add a layer of active defense to your cloud applications.☆94Updated this week
- ☆74Updated 4 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆161Updated this week
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- A standard for reducing log volume without sacrificing analytical capability☆207Updated 5 months ago
- Lambda function that streamlines containment of an AWS account compromise☆346Updated last year
- Analyze assets authorization, who has access to what and how☆76Updated 4 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆331Updated 3 months ago
- A Software as a Service (SaaS) log collection framework.☆174Updated last week
- Python library to carry out DFIR analysis on the Cloud☆482Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆187Updated 11 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆114Updated this week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆377Updated this week
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆281Updated last year
- ☆390Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated last year
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆43Updated last month
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆165Updated 5 months ago
- Graph-based security analysis for everyone☆349Updated last year
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆76Updated last year
- A simple open source command line tool to support common operations over OSCAL content.☆53Updated this week
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 4 months ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆42Updated last week
- Generate datasets of cloud audit logs for common attacks☆217Updated 11 months ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆250Updated this week
- Various deployments of the OSCAL editor☆46Updated last year