ukncsc / zero-trust-architectureView external linksLinks
Principles to help you design and deploy a zero trust architecture
☆1,696Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
Sorting:
- NCSC Guidance for secure development and deployment☆443Nov 23, 2017Updated 8 years ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆273Apr 26, 2024Updated last year
- A curated collection of awesome resources for the zero-trust security model.☆767Dec 9, 2022Updated 3 years ago
- A notation for small commits messages that show the risk involved in each step☆340Aug 6, 2025Updated 6 months ago
- List of evergreen skills, based on software development best practices & cross-framework principles, that should serve as a fair assessme…☆2,137Dec 17, 2022Updated 3 years ago
- The largest UI testing best practices list (last update: March 2025)☆1,727Sep 24, 2025Updated 4 months ago
- Logging Made Easy☆710Nov 1, 2023Updated 2 years ago
- Zero trust system☆644Updated this week
- A proof of concept Software Defined Perimeter (SDP) implementation using OpenSPA for service hiding☆58Feb 13, 2022Updated 4 years ago
- OpenSPA - An open and extensible Single Packet Authorization (SPA) protocol☆102Jan 25, 2023Updated 3 years ago
- A curated list of high quality coding style conventions and standards.☆10,582Feb 2, 2026Updated last week
- Github上一些关于零信任的开源软件集合☆61Jan 13, 2021Updated 5 years ago
- A Continuous Threat Modeling methodology☆324Jun 24, 2022Updated 3 years ago
- Zero Trust Service Access☆379Dec 22, 2021Updated 4 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Dec 18, 2020Updated 5 years ago
- List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.☆9,399Oct 16, 2025Updated 3 months ago
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆255Nov 10, 2025Updated 3 months ago
- 🧠 Laws, Theories, Principles and Patterns for developers and technologists.☆26,996Feb 6, 2026Updated last week
- Pomerium is an identity and context-aware access proxy.☆4,669Feb 7, 2026Updated last week
- A signed hash chain implementation for zero-trust data management.☆48Dec 17, 2018Updated 7 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆61Jan 10, 2022Updated 4 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆602Nov 28, 2024Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Nov 28, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Main Sigma Rule Repository☆10,109Updated this week
- Software Defined Perimeter using readily available Open Source components☆12Jan 18, 2019Updated 7 years ago
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆31,602Feb 7, 2026Updated last week
- A Pythonic framework for threat modeling☆1,103Updated this week
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,256Dec 8, 2025Updated 2 months ago
- Multi-Cloud Security Auditing Tool☆7,532Sep 23, 2025Updated 4 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,944May 1, 2025Updated 9 months ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Tfsec is now part of Trivy☆6,952Nov 10, 2025Updated 3 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Updated this week
- A repository for using osquery for incident detection and response☆881Sep 8, 2025Updated 5 months ago
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- ☆69Jul 18, 2025Updated 6 months ago
- Linux Runtime Security and Forensics using eBPF☆4,362Updated this week