simonarnell / GDPRDPIAT
A GDPR Data Protection Impact Assessment (DPIA) tool to assist organisations to evaluate data protection risks with respect to the EU's General Data Protection Regulation. ๐ช๐บ
โ47Updated 2 years ago
Alternatives and similar repositories for GDPRDPIAT:
Users that are interested in GDPRDPIAT are comparing it to the libraries listed below
- Open Source Data Protection/Privacy Regulatory Mapping Projectโ178Updated last year
- Legal, procedural and policies document templates for operating an IRTโ64Updated last year
- โ๏ธHaven GRC - easier governance, risk, and compliance ๐จโโ๏ธ๐ฎโโ๏ธ๐ฆธโโ๏ธ๐ต๏ธโโ๏ธ๐ฉโ๐ฌโ100Updated 3 years ago
- A privacy and security engineering toolkit: Discover, understand, pseudonymize, anonymize, encrypt and securely share sensitive and persoโฆโ119Updated 8 months ago
- Machine readable cybersecurity compliance standards library for Python, starting with FISMA and NIST Risk Management Frameworkโ61Updated 5 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.โ48Updated 8 years ago
- Vendor Security Model Contractโ98Updated 2 years ago
- DevSecOps Toolchainโ111Updated 7 years ago
- An open source, self-service GRC tool to automate security assessments and compliance.โ189Updated 4 months ago
- โ44Updated 2 years ago
- Repository for the Open Information Security Risk Universeโ63Updated 2 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and governmentโ27Updated 7 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.โ140Updated last year
- โ29Updated 6 years ago
- CLI for generating policies, standards and control procedures (PSP) documentation in Markdown and publishing to JupiterOne or Confluenceโ84Updated 10 months ago
- A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls dataโ26Updated 5 years ago
- IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to searโฆโ66Updated 4 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LUโ105Updated last week
- Security Blueprint for Startupsโ39Updated 5 years ago
- Sensitive Data Discovery toolโ32Updated 6 years ago
- read the docs version of risk managementโ25Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platformโ249Updated 3 weeks ago
- Dashboard to collect, analyze, and respond to reported phishing emails.โ290Updated last year
- โ57Updated 4 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploitsโ163Updated 2 weeks ago
- โ21Updated 9 months ago
- Computer Aided Integration of Requirements and Information Security - Serverโ161Updated 8 months ago
- A repository for wardley maps related to security topics.โ46Updated 8 years ago
- OWASP Ontology-driven Threat Modelling frameworkโ37Updated last year
- The Secure Coding Frameworkโ268Updated 4 years ago