Principles to help you design and deploy a zero trust architecture
☆1,696Apr 25, 2023Updated 3 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- NCSC Guidance for secure development and deployment☆442Nov 23, 2017Updated 8 years ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆275Apr 26, 2024Updated 2 years ago
- A notation for small commits messages that show the risk involved in each step☆341Aug 6, 2025Updated 9 months ago
- A curated collection of awesome resources for the zero-trust security model.☆771Dec 9, 2022Updated 3 years ago
- List of evergreen skills, based on software development best practices & cross-framework principles, that should serve as a fair assessme…☆2,227Dec 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The largest UI testing best practices list (last update: March 2025)☆1,737Sep 24, 2025Updated 7 months ago
- Logging Made Easy☆708Nov 1, 2023Updated 2 years ago
- Zero trust system☆648Apr 30, 2026Updated last week
- A curated list of high quality coding style conventions and standards.☆10,778Apr 20, 2026Updated 2 weeks ago
- OpenSPA - An open and extensible Single Packet Authorization (SPA) protocol☆104Jan 25, 2023Updated 3 years ago
- A proof of concept Software Defined Perimeter (SDP) implementation using OpenSPA for service hiding☆57Feb 13, 2022Updated 4 years ago
- Github上一些关于零信任的开源软件集合☆61Apr 21, 2026Updated 2 weeks ago
- A signed hash chain implementation for zero-trust data management.☆48Dec 17, 2018Updated 7 years ago
- Zero Trust Service Access☆379Dec 22, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆254Nov 10, 2025Updated 5 months ago
- A Continuous Threat Modeling methodology☆327Jun 24, 2022Updated 3 years ago
- 🧠 Laws, Theories, Principles and Patterns for developers and technologists.☆27,088Feb 6, 2026Updated 3 months ago
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Dec 18, 2020Updated 5 years ago
- Pomerium is an identity and context-aware access proxy.☆4,777Updated this week
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆62Jan 10, 2022Updated 4 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,446Apr 17, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Questions to ask the company during your interview☆28,527Feb 19, 2025Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,286Apr 29, 2026Updated last week
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Nov 28, 2024Updated last year
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,267Dec 8, 2025Updated 5 months ago
- Zero trust proxy for using in corporate☆73Apr 29, 2026Updated last week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- A Pythonic framework for threat modeling☆1,125Updated this week
- Main Sigma Rule Repository☆10,386May 1, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Infection Monkey - An open-source adversary emulation platform☆6,998May 1, 2025Updated last year
- Terraform style guide☆17Feb 14, 2019Updated 7 years ago
- Multi-Cloud Security Auditing Tool☆7,644Sep 23, 2025Updated 7 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,888Updated this week
- The Hunting ELK☆3,921Jun 1, 2024Updated last year
- A repository for using osquery for incident detection and response☆893Sep 8, 2025Updated 8 months ago