salesforce / cloud-guardrails
Rapidly apply hundreds of security controls in Azure
☆180Updated 10 months ago
Related projects: ⓘ
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆52Updated last year
- ThreatModel for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based app…☆57Updated last year
- A curated list of awesome Microsoft Azure Security tools, guides, blogs, and other resources.☆326Updated 11 months ago
- ☆62Updated last month
- A collection of DoD and Federal Government Cloud Computing Resources☆47Updated 3 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS, HIPAA HITRUST, NIST, and more acros…☆55Updated this week
- Unlocking Serverless Computing to Assess Security Controls☆242Updated 6 months ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆67Updated this week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆93Updated 9 months ago
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆148Updated 11 months ago
- Microsoft Security Guidance☆245Updated 4 months ago
- Security auditing tool for Azure environments☆556Updated last year
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆379Updated 5 months ago
- ☆108Updated last month
- A repo for testing and demonstration purposes.☆30Updated last month
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆78Updated 9 months ago
- Create custom auto-remediation solutions using serverless functions in the cloud.☆52Updated last year
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆55Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆77Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆137Updated 5 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆303Updated last month
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆99Updated last year
- ☆237Updated 2 months ago
- Cfngoat is Bridgecrew's "Vulnerable by Design" Cloudformation repository. Cfngoat is a learning and training project that demonstrates ho…☆91Updated last month
- Get started fast with a built out lab, built from scratch via Azure Resource Manager (ARM) and Desired State Configuration (DSC), to test…☆234Updated 4 years ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated 4 months ago
- Vulnerable Kustomize Kubernetes templates for training and education☆47Updated 2 years ago
- Study Guide for the Microsoft Azure Security Technologies Exam☆114Updated 2 years ago
- OWASP Foundation Web Respository☆52Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆165Updated 7 months ago