ocsf / governanceLinks
☆32Updated last year
Alternatives and similar repositories for governance
Users that are interested in governance are comparing it to the libraries listed below
Sorting:
- OCSF Documentation☆144Updated last month
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last week
- ☆75Updated 8 months ago
- OCSF Schema☆748Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- A simple open source command line tool to support common operations over OSCAL content.☆55Updated 3 months ago
- Add a layer of active defense to your cloud applications.☆99Updated last week
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 9 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆146Updated last year
- An opinionated tooling platform for managing compliance as code, using continuous integration and NIST's OSCAL standard.☆218Updated this week
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Updated this week
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 8 months ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated 2 years ago
- A list of tools, blog posts, and other resources that further the use and adoption of OSCAL standards.☆190Updated 5 months ago
- Lambda function that streamlines containment of an AWS account compromise☆345Updated last year
- Various deployments of the OSCAL editor☆47Updated last year
- A Software as a Service (SaaS) log collection framework.☆179Updated 2 weeks ago
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆45Updated 5 years ago
- FINOS Common Cloud Controls☆73Updated last week
- Generate datasets of cloud audit logs for common attacks☆224Updated last year
- FedRAMP Automation☆347Updated 7 months ago
- Cross cloud workload identity research and workshops☆43Updated last month
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆336Updated 7 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- Analyze assets authorization, who has access to what and how☆76Updated 8 months ago
- AI Security Shared Responsibility Model☆85Updated 2 months ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆57Updated 8 months ago
- ☆98Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆221Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆388Updated 3 months ago