ukncsc / zero-trust-architecture
Principles to help you design and deploy a zero trust architecture
☆1,665Updated last year
Alternatives and similar repositories for zero-trust-architecture:
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
- NCSC Guidance for secure development and deployment☆442Updated 7 years ago
- A curated collection of awesome resources for the zero-trust security model.☆743Updated 2 years ago
- Logging Made Easy☆708Updated last year
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆266Updated 9 months ago
- SAMM stands for Software Assurance Maturity Model.☆398Updated 2 years ago
- Random questions to ask during interviews.☆467Updated 6 years ago
- threatspec - continuous threat modeling, through code☆345Updated 4 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,478Updated 6 months ago
- A notation for small commits messages that show the risk involved in each step☆324Updated 2 months ago
- Draw.io libraries for threat modeling diagrams☆728Updated 4 years ago
- Graph platform for Detection and Response☆689Updated 2 years ago
- CISA's catalog of bad practices that are exceptionally risky.☆205Updated 3 months ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆841Updated 5 months ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆307Updated 8 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,051Updated last month
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆407Updated last week
- This repo has been replaced by https://www.cloudvulndb.org☆721Updated 2 years ago
- Fast and efficient osquery management☆413Updated this week
- Repository for the Open Security Reference Architecture☆125Updated last month
- Agile Threat Modeling Toolkit☆644Updated last week
- Open Security Controls Assessment Language (OSCAL)☆705Updated last week
- A Pythonic framework for threat modeling☆959Updated this week
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆380Updated this week
- An open source, online threat modelling tool from OWASP☆483Updated 7 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 7 months ago
- Create actionable data from your Vulnerability Scans☆1,366Updated 2 years ago
- The Elevation of Privilege Threat Modeling Game☆317Updated 8 months ago
- An open source threat modeling tool from OWASP☆1,017Updated this week
- Public version of PagerDuty's employee security training courses.☆412Updated last year