tailscale / security-policies
Security policies for Tailscale
☆285Updated 2 months ago
Alternatives and similar repositories for security-policies:
Users that are interested in security-policies are comparing it to the libraries listed below
- Minimum Viable Secure Product mvsp.dev☆191Updated 3 months ago
- A Software as a Service (SaaS) log collection framework.☆162Updated this week
- GitHub App to watch for PRs merged without a reviewer approving.☆122Updated last year
- ☆96Updated this week
- List of known AWS accounts☆190Updated this week
- ☆216Updated 3 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 9 months ago
- Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe …☆384Updated this week
- Documenting your Threat Models with HCL☆425Updated 6 months ago
- Vendor Security Model Contract☆98Updated 2 years ago
- Audit log wall of shame.☆41Updated 5 months ago
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆353Updated 2 weeks ago
- Automate permissions to your cloud and critical applications.☆239Updated last year
- AWS Attack Path Management Tool - Walking on the Moon☆242Updated 3 months ago
- List of vendors that do not allow IMDSv2 enforcement☆141Updated 10 months ago
- No need for IAM users when we have Yubikeys☆158Updated 2 years ago
- HTTP proxy that injects 3rd party credentials into requests☆205Updated last week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆120Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆146Updated last month
- boostsecurityio/poutine☆259Updated 3 weeks ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆262Updated 2 years ago
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- ☆112Updated 2 months ago
- An access-limiting stateless GitHub API Proxy☆149Updated 2 years ago
- A simple touchID prompt'er for use in shell scripts.☆96Updated 9 months ago
- Built-in Panther detection rules and policies☆369Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆72Updated 9 months ago
- GCP CSPM using Google Sheets☆35Updated 9 months ago
- OWASP Domain Protect - prevent subdomain takeover☆401Updated 3 months ago