ukncsc / zero-trust-architecture
Principles to help you design and deploy a zero trust architecture
☆1,645Updated last year
Related projects ⓘ
Alternatives and complementary repositories for zero-trust-architecture
- NCSC Guidance for secure development and deployment☆440Updated 6 years ago
- A curated collection of awesome resources for the zero-trust security model.☆732Updated last year
- 👨💻Learning Path for Programmers https://roadmap.now.sh☆260Updated last year
- Random questions to ask during interviews.☆457Updated 5 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,401Updated 3 months ago
- Logging Made Easy☆707Updated last year
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆634Updated 10 months ago
- threatspec - continuous threat modeling, through code☆332Updated 3 years ago
- Graph platform for Detection and Response☆687Updated last year
- Repository for the Open Security Reference Architecture☆123Updated last week
- Zero trust system☆594Updated last week
- 👤 Identity and Access Management knowledge for cloud platforms☆1,747Updated this week
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆293Updated 4 months ago
- This repo has been replaced by https://www.cloudvulndb.org☆718Updated 2 years ago
- An installable desktop variant of OWASP Threat Dragon☆594Updated this week
- Agile Threat Modeling Toolkit☆615Updated this week
- A repository for using osquery for incident detection and response☆826Updated 2 years ago
- Security Remediation Guides☆708Updated 3 weeks ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,271Updated last year
- BeyondCorp-inspired HTTPS/SSO Access Proxy. Secure internal services outside your VPN/perimeter network during a zero-trust transition.☆250Updated 2 years ago
- Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powere…☆3,000Updated last week
- GitHub App to set and enforce security policies☆1,254Updated this week
- Getting a handle on container security☆632Updated 11 months ago
- An open source, online threat modelling tool from OWASP☆483Updated 4 months ago
- Probably the most boring-but-necessary repo on GitHub. If you care about the security/privacy of your data...!☆156Updated 7 years ago
- A collective list of public APIs for use in security. Contributions welcome☆886Updated 2 months ago
- Detect Tactics, Techniques & Combat Threats☆2,062Updated this week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆778Updated 4 years ago
- Fast and efficient osquery management☆387Updated this week