ukncsc / zero-trust-architecture
Principles to help you design and deploy a zero trust architecture
☆1,672Updated last year
Alternatives and similar repositories for zero-trust-architecture:
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
- NCSC Guidance for secure development and deployment☆444Updated 7 years ago
- A curated collection of awesome resources for the zero-trust security model.☆747Updated 2 years ago
- Random questions to ask during interviews.☆467Updated 6 years ago
- 👨💻Learning Path for Programmers https://roadmap.now.sh☆265Updated 2 years ago
- Logging Made Easy☆710Updated last year
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,502Updated 7 months ago
- Repository for the Open Security Reference Architecture☆126Updated this week
- An open source, online threat modelling tool from OWASP☆483Updated 9 months ago
- SAMM stands for Software Assurance Maturity Model.☆398Updated 2 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆633Updated last year
- Fast and efficient osquery management☆426Updated this week
- This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 a…☆413Updated last month
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆787Updated 4 years ago
- Security Champions Playbook v 2.1☆360Updated last year
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆416Updated 11 months ago
- ☆967Updated 3 months ago
- A repository for using osquery for incident detection and response☆842Updated 2 years ago
- A knowledge base of actionable Incident Response techniques☆632Updated 2 years ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆272Updated 4 years ago
- The Elevation of Privilege Threat Modeling Game☆321Updated 9 months ago
- Checklist for container security - devsecops practices☆1,551Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆724Updated 2 years ago
- Draw.io libraries for threat modeling diagrams☆734Updated 4 years ago
- An installable desktop variant of OWASP Threat Dragon☆594Updated 4 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,962Updated last week
- Open Source Security Events Metadata (OSSEM)☆1,260Updated 2 years ago
- Getting a handle on container security☆647Updated last year
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,155Updated last week
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆854Updated 7 months ago
- Open Source Data Protection/Privacy Regulatory Mapping Project☆176Updated last year