tailscale / security-policiesLinks
Security policies for Tailscale
☆292Updated last month
Alternatives and similar repositories for security-policies
Users that are interested in security-policies are comparing it to the libraries listed below
Sorting:
- Minimum Viable Secure Product mvsp.dev☆193Updated 5 months ago
- A Software as a Service (SaaS) log collection framework.☆170Updated this week
- Documenting your Threat Models with HCL☆427Updated this week
- ☆98Updated last month
- GitHub App to watch for PRs merged without a reviewer approving.☆125Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆314Updated 11 months ago
- List of known AWS accounts☆209Updated 3 weeks ago
- Automate permissions to your cloud and critical applications.☆241Updated last year
- ☆217Updated 5 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆366Updated last week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆125Updated last month
- Audit log wall of shame.☆41Updated 7 months ago
- ☆210Updated 8 months ago
- No need for IAM users when we have Yubikeys☆158Updated 3 years ago
- A simple touchID prompt'er for use in shell scripts.☆97Updated 11 months ago
- Vendor Security Model Contract☆98Updated 2 years ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated last year
- Automated security decision making under uncertainty☆27Updated last month
- Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe …☆390Updated 2 weeks ago
- Compares and analyzes GCP IAM roles.☆77Updated 2 months ago
- HTTP proxy that injects 3rd party credentials into requests☆214Updated last month
- A checklist of practices for organizations dealing with account takeover (ATO)☆269Updated 7 months ago
- Identity & Access Management simplified and secure.☆257Updated 2 years ago
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- A honey token manager and alert system for AWS.☆319Updated 3 years ago
- ☆112Updated last week
- Automated testing, generation & manipulation of #osquery packs☆72Updated 7 months ago
- boostsecurityio/poutine☆279Updated this week
- Production-ready detection & response queries for osquery☆573Updated this week
- Open source compliance tool for development platforms.☆286Updated last year