Principles to help you design and deploy a zero trust architecture
☆1,697Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
Sorting:
- NCSC Guidance for secure development and deployment☆443Nov 23, 2017Updated 8 years ago
- A curated collection of awesome resources for the zero-trust security model.☆765Dec 9, 2022Updated 3 years ago
- List of evergreen skills, based on software development best practices & cross-framework principles, that should serve as a fair assessme…☆2,180Dec 17, 2022Updated 3 years ago
- The largest UI testing best practices list (last update: March 2025)☆1,727Sep 24, 2025Updated 5 months ago
- Logging Made Easy☆710Nov 1, 2023Updated 2 years ago
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆450Updated this week
- Zero trust system☆644Feb 23, 2026Updated 2 weeks ago
- A proof of concept Software Defined Perimeter (SDP) implementation using OpenSPA for service hiding☆57Feb 13, 2022Updated 4 years ago
- OpenSPA - An open and extensible Single Packet Authorization (SPA) protocol☆102Jan 25, 2023Updated 3 years ago
- A curated list of high quality coding style conventions and standards.☆10,649Updated this week
- Github上一些关于零信任的开源软件集合☆61Jan 13, 2021Updated 5 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Zero Trust Service Access☆379Dec 22, 2021Updated 4 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Dec 18, 2020Updated 5 years ago
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆255Nov 10, 2025Updated 3 months ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,411Oct 16, 2025Updated 4 months ago
- Pomerium is an identity and context-aware access proxy.☆4,691Updated this week
- 🧠 Laws, Theories, Principles and Patterns for developers and technologists.☆27,008Feb 6, 2026Updated last month
- A signed hash chain implementation for zero-trust data management.☆48Dec 17, 2018Updated 7 years ago
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated last month
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆605Nov 28, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- Main Sigma Rule Repository☆10,156Mar 2, 2026Updated last week
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- A Pythonic framework for threat modeling☆1,110Feb 24, 2026Updated last week
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆32,947Updated this week
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,257Dec 8, 2025Updated 3 months ago
- Multi-Cloud Security Auditing Tool☆7,562Sep 23, 2025Updated 5 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,963May 1, 2025Updated 10 months ago
- Re-play Security Events☆1,725Mar 20, 2024Updated last year
- Tfsec is now part of Trivy☆6,961Nov 10, 2025Updated 3 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Mar 2, 2026Updated last week
- The Hunting ELK☆3,912Jun 1, 2024Updated last year
- A repository for using osquery for incident detection and response☆880Sep 8, 2025Updated 6 months ago
- ☆69Jul 18, 2025Updated 7 months ago
- Linux Runtime Security and Forensics using eBPF☆4,406Updated this week
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,967Mar 2, 2026Updated last week
- The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in productio…☆9,598Oct 21, 2024Updated last year