NCSC Guidance for secure development and deployment
☆442Nov 23, 2017Updated 8 years ago
Alternatives and similar repositories for secure-development-and-deployment
Users that are interested in secure-development-and-deployment are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- List of evergreen skills, based on software development best practices & cross-framework principles, that should serve as a fair assessme…☆2,227Dec 17, 2022Updated 3 years ago
- Principles to help you design and deploy a zero trust architecture☆1,696Apr 25, 2023Updated 3 years ago
- A notation for small commits messages that show the risk involved in each step☆341Aug 6, 2025Updated 9 months ago
- A curated list of high quality coding style conventions and standards.☆10,778Apr 20, 2026Updated 2 weeks ago
- Awesome online talks and screencasts☆6,191Jul 7, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- 👩💻👨💻 Awesome cheatsheets for popular programming languages, frameworks and development tools. They include everything you should kn…☆45,776Apr 12, 2026Updated 3 weeks ago
- Some useful websites for programmers.☆76,031Sep 16, 2025Updated 7 months ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- Curated coding interview preparation materials for busy software engineers☆139,281Apr 5, 2026Updated last month
- Pam based webhook authentication for Kubernetes☆79Aug 23, 2020Updated 5 years ago
- ☆23Mar 18, 2022Updated 4 years ago
- Ansible roles for managing system patching☆18Dec 8, 2014Updated 11 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This script validates the most common Conditional Access policies in Microsoft 365.☆10May 27, 2024Updated last year
- The Data Analysis Pipeline☆17Apr 23, 2019Updated 7 years ago
- Master the command line, in one page☆160,859Jun 25, 2024Updated last year
- A generic monitoring client☆14May 17, 2012Updated 13 years ago
- Repository for the Open Information Security Risk Universe☆64Jul 10, 2022Updated 3 years ago
- Crowdsourced event coverage system developed by Pittsburgh IndyMedia during the G20. Incorporates twitter, flickr, google maps, podcast…☆25Feb 15, 2010Updated 16 years ago
- ☆75Apr 12, 2018Updated 8 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- A faster way to deploy to Kubernetes!☆109Jun 3, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A toolkit for Kubernetes cluster provisioning and lifecycle management☆265Aug 6, 2019Updated 6 years ago
- Framework for API Maturity Assessment☆20Jan 17, 2020Updated 6 years ago
- ☆76Oct 16, 2022Updated 3 years ago
- ☆103Nov 21, 2025Updated 5 months ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Dec 7, 2016Updated 9 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A complete computer science study plan to become a software engineer.☆344,747Aug 28, 2025Updated 8 months ago
- Simplifying Seccomp enforcement in containerized or non-containerized apps☆113Oct 29, 2020Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated 2 years ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆218,164Nov 19, 2024Updated last year
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago