paulveillard / cybersecurity-pamLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Privileged Access Management (PAM) in Cybersecurity.
☆28Updated 2 years ago
Alternatives and similar repositories for cybersecurity-pam
Users that are interested in cybersecurity-pam are comparing it to the libraries listed below
Sorting:
- T-Guard Repository☆17Updated last year
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆25Updated 3 years ago
- Docker helper files for running eramba software☆52Updated last week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆88Updated 2 weeks ago
- Add a layer of active defense to your cloud applications.☆95Updated this week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆325Updated this week
- AxoSyslog - the scalable security data processor☆94Updated this week
- The Wazuh agent for endpoints.☆85Updated 2 months ago
- Aranya user library, daemon, and policy code☆183Updated this week
- Useful templates and working document for implementing ISO 27001 - ISMS☆180Updated 4 months ago
- DevGuard Backend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate your …☆87Updated this week
- OWASP Foundation Web Respository☆59Updated 2 months ago
- (Unofficial) Wazuh integration to send alerts to IRIS.☆19Updated 8 months ago
- The Auditree framework tool to run compliance control checks as unit tests.☆71Updated last year
- Manage, monitor and improve your cyber security posture.☆93Updated 2 years ago
- A modern, all-in-one Governance, Risk & Compliance (GRC) solution designed for privacy, security, and compliance teams. As an open-source…☆59Updated last week
- ☆75Updated 5 months ago
- 🤖 Admyral enables continuous control monitoring for any custom control☆335Updated 9 months ago
- VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities☆102Updated 11 months ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆102Updated 5 years ago
- DefectDojo Community Content☆18Updated last week
- ☆53Updated 3 years ago
- Enterprise-Grade OpenSource CMDB with flexible data model.☆146Updated this week
- Wazuh Agent as Docker Image☆24Updated last year
- Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.☆235Updated this week
- This python app generates NIST 800 53 control implementation for each control and generate the CSV file.☆51Updated last year
- SecObserve is an open source vulnerability and license management system for software development teams and cloud environments. It suppor…☆178Updated this week
- NIST OSCAL SDK and CLI☆19Updated 2 weeks ago
- Template SOC2 Policy Authority - documentation pipeline☆115Updated 4 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week