tailscale / security-policies
Security policies for Tailscale
☆276Updated last week
Alternatives and similar repositories for security-policies:
Users that are interested in security-policies are comparing it to the libraries listed below
- Minimum Viable Secure Product mvsp.dev☆188Updated last month
- GitHub App to watch for PRs merged without a reviewer approving.☆118Updated last year
- Documenting your Threat Models with HCL☆412Updated 4 months ago
- A Software as a Service (SaaS) log collection framework.☆147Updated last month
- List of known AWS accounts☆177Updated last month
- A multi-vault secret injection tool for safely injecting secrets into app environment☆106Updated this week
- ☆92Updated 3 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆305Updated 7 months ago
- Automate permissions to your cloud and critical applications.☆238Updated 10 months ago
- List of vendors that do not allow IMDSv2 enforcement☆142Updated 8 months ago
- ☆209Updated last month
- Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe …☆375Updated last month
- Evaluate source control (GitHub) security posture☆249Updated last year
- Audit log wall of shame.☆41Updated 3 months ago
- ☆205Updated 3 months ago
- The SOCless automation framework☆134Updated last month
- A simple touchID prompt'er for use in shell scripts.☆95Updated 7 months ago
- AWS Attack Path Management Tool - Walking on the Moon☆233Updated last month
- Open Source Software Secure Supply Chain Framework☆234Updated 2 years ago
- Access Undenied parses AWS AccessDenied CloudTrail events, explains the reasons for them, and offers actionable remediation steps. Open-s…☆261Updated last year
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆334Updated this week
- Dorothy is a tool to test security monitoring and detection for Okta environments☆178Updated 5 months ago
- A honey token manager and alert system for AWS.☆316Updated 3 years ago
- No need for IAM users when we have Yubikeys☆158Updated 2 years ago
- boostsecurityio/poutine☆243Updated last week
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆140Updated this week
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- ☆111Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆141Updated 7 months ago
- A production-friendly malware scanner for your AWS cloud☆198Updated 3 years ago