paulveillard / cybersecurity-pamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆28Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
Sorting:
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆24Updated 3 years ago
- Open source incident management and response platform.☆12Updated 7 years ago
- DefectDojo Community Content☆18Updated last month
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Updated last month
- CrowdSec Documentation: Comprehensive guides, tutorials, and references for installing, configuring, and using CrowdSec, an open-source c…☆33Updated this week
- Add a layer of active defense to your cloud applications.☆93Updated this week
- FedRAMP Requests For Comments (RFCs)☆18Updated 3 weeks ago
- The Wazuh agent for endpoints.☆77Updated last week
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆11Updated 3 years ago
- ☆73Updated 3 months ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆76Updated this week
- The OWASP SAMM Website☆11Updated last week
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 9 months ago
- CyHy Dashboard☆17Updated this week
- AxoSyslog - the scalable security data processor☆87Updated this week
- Cloud-native Open-Source Cloud Management Framework☆30Updated this week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆86Updated 2 weeks ago
- Manage, monitor and improve your cyber security posture.☆90Updated 2 years ago
- T-Guard Repository☆16Updated last year
- Wazuh Agent as Docker Image☆24Updated last year
- 🌹 Thorn is an open-source, data privacy vault to store and manage PII in a fully compliant manner.☆22Updated last year
- Security Monitoring using Wazuh, published by Packt☆24Updated last year
- Compare vulnerability scanners results (to make them better!)☆22Updated 3 weeks ago
- The Auditree framework tool to run compliance control checks as unit tests.☆68Updated 10 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated last week
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆32Updated last year
- ☆16Updated 2 weeks ago
- wordpress-k8s-operator - charm repository.☆15Updated this week
- BRAVE (Bare Metal Replication And Virtualization Environment)☆40Updated last year