ocsf / governanceLinks
☆32Updated 11 months ago
Alternatives and similar repositories for governance
Users that are interested in governance are comparing it to the libraries listed below
Sorting:
- OCSF Documentation☆144Updated 3 weeks ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆263Updated 2 months ago
- OCSF Schema☆737Updated last week
- ☆75Updated 7 months ago
- Add a layer of active defense to your cloud applications.☆96Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- Lambda function that streamlines containment of an AWS account compromise☆345Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆257Updated 4 months ago
- A standard for reducing log volume without sacrificing analytical capability☆211Updated 8 months ago
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated last month
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated last year
- Various deployments of the OSCAL editor☆47Updated last year
- Graph-based security analysis for everyone☆351Updated last year
- ☆124Updated last week
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆45Updated 5 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆336Updated 6 months ago
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 7 months ago
- Template SOC2 Policy Authority - documentation pipeline☆132Updated 5 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆56Updated 7 months ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated 3 months ago
- Generate datasets of cloud audit logs for common attacks☆222Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆385Updated 3 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆285Updated last year
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆185Updated 4 months ago
- Cross cloud workload identity research and workshops☆42Updated 3 weeks ago
- ☆395Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated last year
- FedRAMP Automation☆345Updated 7 months ago