ukncsc / zero-trust-architecture
Principles to help you design and deploy a zero trust architecture
☆1,677Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture:
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
- NCSC Guidance for secure development and deployment☆445Updated 7 years ago
- A curated collection of awesome resources for the zero-trust security model.☆749Updated 2 years ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆270Updated last year
- 👨💻Learning Path for Programmers https://roadmap.now.sh☆266Updated 2 years ago
- A notation for small commits messages that show the risk involved in each step☆331Updated 4 months ago
- Random questions to ask during interviews.☆468Updated 6 years ago
- Production-ready detection & response queries for osquery☆564Updated this week
- threatspec - continuous threat modeling, through code☆355Updated 4 years ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆313Updated 10 months ago
- A flexible control server for osquery fleets☆1,105Updated 4 years ago
- Logging Made Easy☆711Updated last year
- An installable desktop variant of OWASP Threat Dragon☆594Updated 5 months ago
- CyberArk Conjur automatically secures secrets used by privileged users and machine identities☆816Updated 2 months ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆858Updated 8 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,525Updated 8 months ago
- List of evergreen skills, based on software development best practices & cross-framework principles, that should serve as a fair assessme…☆1,944Updated 2 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- Graph platform for Detection and Response☆692Updated 2 years ago
- A repository for using osquery for incident detection and response☆844Updated 2 years ago
- all paths lead to clouds☆639Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆491Updated last year
- CIS Docker Benchmark - InSpec Profile☆506Updated last year
- Zero Trust Service Access☆384Updated 3 years ago
- Fast and efficient osquery management☆441Updated last week
- DevSec Linux Baseline - InSpec Profile☆803Updated 8 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆385Updated last year
- Supply-chain Levels for Software Artifacts☆1,651Updated this week
- Draw.io libraries for threat modeling diagrams☆741Updated 4 years ago
- OCSF Schema☆676Updated this week
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,352Updated this week