tenable / cloud-security-actionsLinks
☆12Updated 2 months ago
Alternatives and similar repositories for cloud-security-actions
Users that are interested in cloud-security-actions are comparing it to the libraries listed below
Sorting:
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated 3 weeks ago
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆29Updated last year
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- ☆41Updated 3 months ago
- ☆30Updated this week
- (WIP) CIS Microsoft Azure Foundations Benchmark☆16Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- ☆12Updated this week
- Security Alert Decoration☆27Updated last month
- Prisma Cloud SDK in Go☆17Updated 2 months ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 8 months ago
- ☆10Updated 3 years ago
- ☆16Updated 10 months ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- ☆16Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 4 months ago
- OpenCSPM Community Controls☆14Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- ☆45Updated 7 months ago
- A meta-database collecting resources that compile lists of breaches☆20Updated 7 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 3 weeks ago
- Cloud Security Tools☆16Updated 4 years ago
- Cloud Security Posture security policies☆31Updated 9 months ago
- Workflows for Shuffle☆23Updated 2 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year