ukncsc / zero-trust-architectureLinks
Principles to help you design and deploy a zero trust architecture
☆1,688Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
Sorting:
- NCSC Guidance for secure development and deployment☆443Updated 7 years ago
- A curated collection of awesome resources for the zero-trust security model.☆759Updated 2 years ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,637Updated last year
- Repository for the Open Security Reference Architecture☆130Updated 2 weeks ago
- CSA Guidance☆217Updated 8 years ago
- Getting a handle on container security☆662Updated last year
- Agile Threat Modeling Toolkit☆695Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆326Updated last year
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,227Updated last week
- threatspec - continuous threat modeling, through code☆367Updated 4 years ago
- 👤 Identity and Access Management knowledge for cloud platforms☆2,047Updated last week
- This repo has been replaced by https://www.cloudvulndb.org☆726Updated 3 years ago
- The Elevation of Privilege Threat Modeling Game☆337Updated last year
- SAMM stands for Software Assurance Maturity Model.☆395Updated 3 years ago
- This project is about creating and publishing threat model examples.☆425Updated 3 years ago
- Logging Made Easy☆710Updated last year
- Supply-chain Levels for Software Artifacts☆1,731Updated last week
- GitHub App to set and enforce security policies☆1,359Updated 2 weeks ago
- ☆540Updated this week
- Checklist for container security - devsecops practices☆1,591Updated 2 weeks ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆271Updated last year
- Graph-based security analysis for everyone☆350Updated last year
- A Pythonic framework for threat modeling☆1,044Updated last month
- Graph platform for Detection and Response☆697Updated 2 years ago
- NIST SP 800-53 content and other OSCAL content examples☆381Updated last week
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k …☆389Updated last year
- Draw.io libraries for threat modeling diagrams☆772Updated 4 years ago
- Open Security Controls Assessment Language (OSCAL)☆786Updated last week
- An open source threat modeling tool from OWASP☆1,201Updated 2 weeks ago
- Threat matrix for CI/CD Pipeline☆759Updated last year