ocsf / ocsf-validatorLinks
OCSF Schema Validation
☆11Updated last year
Alternatives and similar repositories for ocsf-validator
Users that are interested in ocsf-validator are comparing it to the libraries listed below
Sorting:
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆51Updated 5 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆32Updated 3 weeks ago
- Audit log wall of shame.☆42Updated 4 months ago
- ☆35Updated 10 months ago
- Knowledge Report Alert & Normalization Generator☆27Updated 2 weeks ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Updated last year
- Repository to archive GCP Documentation for local use☆16Updated 10 months ago
- A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of mater…☆43Updated 2 years ago
- Collect IAM information from all your AWS organization, accounts, and resources.☆84Updated this week
- A catalog of services that can be publicly exposed within different cloud providers.☆15Updated last year
- Generates runbooks for GuardDuty findings☆39Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Updated last year
- A Software as a Service (SaaS) log collection framework.☆180Updated 2 weeks ago
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Updated 3 years ago
- OCSF Documentation☆149Updated 2 months ago
- Scalable integrity framework for ABAC on AWS☆56Updated 9 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆18Updated 9 months ago
- Repository to archive AWS Documentation for local use☆50Updated last year
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated 2 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated 2 years ago
- Cross cloud workload identity research and workshops☆47Updated last week
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 10 months ago
- ☆31Updated 3 weeks ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆85Updated 5 months ago
- ☆75Updated 2 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Updated 5 months ago
- Compares and analyzes GCP IAM roles.☆77Updated 9 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated last year
- ☆53Updated last year