turbot / steampipe-mod-zoom-complianceLinks
Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampipe.
☆66Updated 3 months ago
Alternatives and similar repositories for steampipe-mod-zoom-compliance
Users that are interested in steampipe-mod-zoom-compliance are comparing it to the libraries listed below
Sorting:
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated last month
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- ☆77Updated 2 weeks ago
- ☆32Updated 7 years ago
- ☆120Updated 2 weeks ago
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 5 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS, HIPAA HITRUST, NIST, and more acros…☆60Updated last week
- Collection of useful Canary tools☆92Updated last week
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- ☆65Updated last year
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Updated 4 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 4 years ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆23Updated 11 months ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- ☆189Updated this week
- A set of Python scripts for finding threats in Office365☆50Updated 2 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆25Updated last year
- Tools and scripts by Arctic Wolf☆69Updated 4 months ago
- ☆34Updated 2 years ago
- Scripts to help work with configuration audit files☆89Updated 2 years ago
- ☆77Updated 3 years ago
- AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more☆64Updated 8 months ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Updated 4 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- This Powershell script is designed to be run on a supported (by Microsoft) Windows host. It checks for the most common issues that will p…☆29Updated 4 years ago