paulveillard / cybersecurity-pamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆29Updated 3 years ago
Alternatives and similar repositories for cybersecurity-pam
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
Sorting:
- AxoSyslog - the scalable security data processor☆99Updated this week
- The Wazuh agent for endpoints.☆90Updated 5 months ago
- T-Guard Repository☆17Updated last year
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆117Updated 3 weeks ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆91Updated this week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆510Updated this week
- Docker helper files for running eramba software☆62Updated 2 months ago
- Aranya user library, daemon, and policy code☆191Updated this week
- Add a layer of active defense to your cloud applications.☆101Updated 2 weeks ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆20Updated 11 months ago
- DefectDojo Community Content☆18Updated last month
- The Auditree framework tool to run compliance control checks as unit tests.☆73Updated last year
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆95Updated this week
- Wazuh dashboard, the Wazuh UI platform☆59Updated last week
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- ☆75Updated 9 months ago
- CLI tool to generate terraform files from existing ZPA and ZIA☆22Updated this week
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆104Updated last year
- Useful templates and working document for implementing ISO 27001 - ISMS☆198Updated this week
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆149Updated 2 weeks ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆25Updated 3 years ago
- Trivy plugin for starting an MCP server☆28Updated 2 weeks ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆336Updated last year
- Repo to hold wazuh manager mcp server☆68Updated 2 months ago
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆241Updated last week
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆111Updated last week
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆113Updated 5 years ago
- 📟 Get notified when your data meets certain conditions by setting up monitors, alerts, and notifications☆76Updated last week
- Start securing your secrets and infrastructure by installing Conjur OSS, using Docker and the official Conjur OSS containers on DockerHub…☆38Updated this week
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆53Updated last year