oruinfosec / SecurityPolicyGenerator
Generate security policies and documents based on KPNs templates.
☆37Updated 5 years ago
Alternatives and similar repositories for SecurityPolicyGenerator:
Users that are interested in SecurityPolicyGenerator are comparing it to the libraries listed below
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆35Updated 3 years ago
- ☆44Updated last year
- Incident Response Playbooks☆14Updated 5 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆51Updated 5 years ago
- ☆116Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 8 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year
- A Secure Controls Framework (SCF) Power BI App☆16Updated 2 months ago
- A tool to monitor for potential spear phishing domains and send to Slack.☆22Updated 11 months ago
- Workflows for Shuffle☆21Updated 2 years ago
- ☆17Updated 2 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 2 months ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- Collection of useful Canary tools☆75Updated last month
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆137Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆109Updated 4 years ago
- read the docs version of risk management☆24Updated last year
- ☆17Updated 3 years ago
- Simulates a compromise in a cloud and container environment☆32Updated last month
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆63Updated this week
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 6 months ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆122Updated 9 months ago