oruinfosec / SecurityPolicyGenerator
Generate security policies and documents based on KPNs templates.
☆37Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for SecurityPolicyGenerator
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆29Updated 3 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆109Updated 4 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- ☆43Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆51Updated 4 years ago
- ☆114Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆36Updated 4 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Recon Hunt Queries☆75Updated 3 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆19Updated last year
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆161Updated 5 months ago
- ☆37Updated 7 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆68Updated 6 months ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆79Updated 2 years ago
- ☆17Updated 3 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 6 months ago
- ☆18Updated 2 years ago
- ☆33Updated 6 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 3 weeks ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆52Updated last year
- Virtual Security Operations Center☆49Updated last year
- Workflows for Shuffle☆20Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆69Updated last month