security4startups / blueprint_2019
Security Blueprint for Startups
☆39Updated 5 years ago
Alternatives and similar repositories for blueprint_2019:
Users that are interested in blueprint_2019 are comparing it to the libraries listed below
- Vendor Security Model Contract☆98Updated 2 years ago
- read the docs version of risk management☆25Updated 2 years ago
- A repository for wardley maps related to security topics.☆46Updated 8 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- OpenControl-formatted industry standards and requirement documents☆45Updated last year
- Osquery Mangement Server☆114Updated 4 years ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 6 years ago
- cloud.gov security policies and procedures☆25Updated 8 months ago
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- Misc resources and documents on my security research☆21Updated 8 years ago
- GCP and GSUITE security auditing scripts☆26Updated 11 months ago
- ☆29Updated 6 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated 2 years ago
- The SOCless automation framework☆139Updated 2 months ago
- Updated incident response generator for training classes☆44Updated 3 years ago
- ☆44Updated 2 years ago
- Machine readable cybersecurity compliance standards library for Python, starting with FISMA and NIST Risk Management Framework☆61Updated 5 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆62Updated 4 years ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆32Updated last year
- GCP CSPM using Google Sheets☆35Updated 3 weeks ago
- Start enforcing G Suite third-party apps via OAuth☆58Updated 6 years ago
- ☆21Updated 9 months ago
- Automate the creation of a System Security Plan (SSP)☆38Updated this week
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Framework for reviewing and responding to events in AWS Flow Logs using Lambda Function☆46Updated last year
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆100Updated 3 years ago