tailscale / security-policies
Security policies for Tailscale
☆290Updated last week
Alternatives and similar repositories for security-policies:
Users that are interested in security-policies are comparing it to the libraries listed below
- Minimum Viable Secure Product mvsp.dev☆192Updated 4 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 10 months ago
- GitHub App to watch for PRs merged without a reviewer approving.☆124Updated 2 weeks ago
- Documenting your Threat Models with HCL☆426Updated 8 months ago
- ☆98Updated 2 weeks ago
- A Software as a Service (SaaS) log collection framework.☆167Updated last week
- List of known AWS accounts☆206Updated last month
- ☆209Updated 7 months ago
- Evaluate source control (GitHub) security posture☆249Updated 2 years ago
- List of vendors that do not allow IMDSv2 enforcement☆141Updated last year
- ☆217Updated 4 months ago
- Chalk allows you to follow code from development, through builds and into production.☆373Updated this week
- A production-friendly malware scanner for your AWS cloud☆199Updated 3 years ago
- Open Source Software Secure Supply Chain Framework☆236Updated 2 years ago
- ☆112Updated 3 months ago
- Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe …☆388Updated this week
- Audit log wall of shame.☆41Updated 6 months ago
- No need for IAM users when we have Yubikeys☆158Updated 3 years ago
- A honey token manager and alert system for AWS.☆319Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆77Updated last month
- Open Cloud Security Posture Management Engine☆338Updated 3 years ago
- Lambda function that streamlines containment of an AWS account compromise☆345Updated last year
- boostsecurityio/poutine☆267Updated this week
- A multi-vault secret injection tool for safely injecting secrets into app environment☆124Updated 2 weeks ago
- HTTP proxy that injects 3rd party credentials into requests☆212Updated 2 weeks ago
- Automate permissions to your cloud and critical applications.☆241Updated last year
- A simple touchID prompt'er for use in shell scripts.☆95Updated 10 months ago
- Vendor Security Model Contract☆98Updated 2 years ago
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆219Updated this week
- Automated security decision making under uncertainty☆26Updated 3 weeks ago