Principles to help you design and deploy a zero trust architecture
☆1,699Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NCSC Guidance for secure development and deployment☆442Nov 23, 2017Updated 8 years ago
- A curated collection of awesome resources for the zero-trust security model.☆768Dec 9, 2022Updated 3 years ago
- List of evergreen skills, based on software development best practices & cross-framework principles, that should serve as a fair assessme…☆2,203Dec 17, 2022Updated 3 years ago
- The largest UI testing best practices list (last update: March 2025)☆1,729Sep 24, 2025Updated 6 months ago
- Logging Made Easy☆709Nov 1, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆455Mar 4, 2026Updated 3 weeks ago
- Zero trust system☆648Updated this week
- A curated list of high quality coding style conventions and standards.☆10,683Updated this week
- OpenSPA - An open and extensible Single Packet Authorization (SPA) protocol☆103Jan 25, 2023Updated 3 years ago
- Github上一些关于零信任的开源软件集合☆61Jan 13, 2021Updated 5 years ago
- A proof of concept Software Defined Perimeter (SDP) implementation using OpenSPA for service hiding☆57Feb 13, 2022Updated 4 years ago
- A signed hash chain implementation for zero-trust data management.☆48Dec 17, 2018Updated 7 years ago
- Zero Trust Service Access☆379Dec 22, 2021Updated 4 years ago
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆255Nov 10, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- 🧠 Laws, Theories, Principles and Patterns for developers and technologists.☆27,028Feb 6, 2026Updated last month
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Dec 18, 2020Updated 5 years ago
- Pomerium is an identity and context-aware access proxy.☆4,723Updated this week
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆62Jan 10, 2022Updated 4 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,416Oct 16, 2025Updated 5 months ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆611Nov 28, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Questions to ask the company during your interview☆28,500Feb 19, 2025Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,270Jan 21, 2026Updated 2 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,080Nov 28, 2024Updated last year
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,260Dec 8, 2025Updated 3 months ago
- Zero trust proxy for using in corporate☆73Feb 11, 2026Updated last month
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- ☆433Jan 28, 2022Updated 4 years ago
- Main Sigma Rule Repository☆10,224Mar 19, 2026Updated last week
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Infection Monkey - An open-source adversary emulation platform☆6,979May 1, 2025Updated 10 months ago
- Terraform style guide☆17Feb 14, 2019Updated 7 years ago
- Multi-Cloud Security Auditing Tool☆7,585Sep 23, 2025Updated 6 months ago
- A Pythonic framework for threat modeling☆1,113Mar 16, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Mar 18, 2026Updated last week
- The Hunting ELK☆3,911Jun 1, 2024Updated last year
- A repository for using osquery for incident detection and response☆884Sep 8, 2025Updated 6 months ago