ukncsc / zero-trust-architectureLinks
Principles to help you design and deploy a zero trust architecture
☆1,681Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
Sorting:
- NCSC Guidance for secure development and deployment☆445Updated 7 years ago
- A curated collection of awesome resources for the zero-trust security model.☆754Updated 2 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆318Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,573Updated 11 months ago
- 👨💻Learning Path for Programmers https://roadmap.now.sh☆265Updated 2 years ago
- Logging Made Easy☆712Updated last year
- Draw.io libraries for threat modeling diagrams☆758Updated 4 years ago
- Graph platform for Detection and Response☆694Updated 2 years ago
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,194Updated this week
- Checklist for container security - devsecops practices☆1,580Updated last year
- GitHub App to set and enforce security policies☆1,342Updated 2 weeks ago
- OCSF Schema☆707Updated last week
- Agile Threat Modeling Toolkit☆681Updated last week
- This repo has been replaced by https://www.cloudvulndb.org☆727Updated 3 years ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆270Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆981Updated 3 weeks ago
- CISA's catalog of bad practices that are exceptionally risky.☆208Updated last month
- Supply-chain Levels for Software Artifacts☆1,692Updated 3 weeks ago
- 👤 Identity and Access Management knowledge for cloud platforms☆1,978Updated last week
- CSA Guidance☆217Updated 8 years ago
- Threat matrix for CI/CD Pipeline☆755Updated last year
- ☆530Updated last week
- An open source, online threat modelling tool from OWASP☆484Updated last year
- threatspec - continuous threat modeling, through code☆361Updated 4 years ago
- Random questions to ask during interviews.☆471Updated 6 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Updated this week
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆222Updated last year
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- Production-ready detection & response queries for osquery☆579Updated 3 weeks ago
- A repository for using osquery for incident detection and response☆855Updated 2 years ago