security4startups / blueprint_2019
Security Blueprint for Startups
☆38Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for blueprint_2019
- Vendor Security Model Contract☆97Updated 2 years ago
- read the docs version of risk management☆24Updated last year
- Osquery Mangement Server☆114Updated 4 years ago
- OpenControl-formatted industry standards and requirement documents☆45Updated last year
- A Terraform module for GRR: the distributed incident forensics and response framework☆51Updated 4 years ago
- ☆30Updated 6 years ago
- cloud.gov security policies and procedures☆25Updated 3 months ago
- A repository for wardley maps related to security topics.☆47Updated 7 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- Legal, procedural and policies document templates for operating an IRT☆63Updated 8 months ago
- ☆43Updated last year
- Example Express application for collecting data from the Stethoscope app☆14Updated 6 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated 10 months ago
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆22Updated 2 years ago
- Updated incident response generator for training classes☆42Updated 3 years ago
- Repository for the Open Information Security Risk Universe☆63Updated 2 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆16Updated last year
- A Java library for programmatically calculating OWASP Risk Rating scores☆18Updated last year
- Prototype of making fisma 800-53 controls interactive☆26Updated 4 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆36Updated 3 months ago
- ☆27Updated 10 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆31Updated last year
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆29Updated 3 weeks ago
- Materials used by Product Management and Product Marketing☆12Updated 6 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆46Updated 8 years ago
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆109Updated 4 months ago
- This script is used to generate some basic detections of the aws security services☆71Updated 2 years ago