oruinfosec / SecurityPolicyGeneratorLinks
Generate security policies and documents based on KPNs templates.
☆38Updated 5 years ago
Alternatives and similar repositories for SecurityPolicyGenerator
Users that are interested in SecurityPolicyGenerator are comparing it to the libraries listed below
Sorting:
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆44Updated 3 years ago
- ☆48Updated 2 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆123Updated last year
- ☆119Updated last year
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆81Updated this week
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated last week
- Updated incident response generator for training classes☆44Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆320Updated last year
- ☆77Updated 2 years ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluence☆85Updated last year
- Vendor Security Model Contract☆98Updated 3 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- ☆17Updated 2 years ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆186Updated last year
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- A Lambda-powered Security Orchestration framework for AWS GuardDuty☆53Updated 5 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated 3 weeks ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆191Updated 11 months ago
- Template SOC2 Policy Authority - documentation pipeline☆116Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 5 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- ☆18Updated 3 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆126Updated last year