ukncsc / zero-trust-architectureLinks
Principles to help you design and deploy a zero trust architecture
☆1,691Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
Sorting:
- NCSC Guidance for secure development and deployment☆443Updated 8 years ago
- A curated collection of awesome resources for the zero-trust security model.☆766Updated 3 years ago
- 👨💻Learning Path for Programmers https://roadmap.now.sh☆265Updated 3 years ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆273Updated last year
- Logging Made Easy☆709Updated 2 years ago
- Random questions to ask during interviews.☆472Updated 6 years ago
- A notation for small commits messages that show the risk involved in each step☆340Updated 5 months ago
- Agile Threat Modeling Toolkit☆717Updated 2 months ago
- Open Security Controls Assessment Language (OSCAL)☆837Updated this week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,691Updated last year
- BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.☆1,444Updated 2 years ago
- Graph platform for Detection and Response☆702Updated 3 years ago
- CSA Guidance☆221Updated 8 years ago
- Probably the most boring-but-necessary repo on GitHub. If you care about the security/privacy of your data...!☆162Updated 8 years ago
- An installable desktop variant of OWASP Threat Dragon☆593Updated 2 months ago
- Draw.io libraries for threat modeling diagrams☆784Updated 5 years ago
- threatspec - continuous threat modeling, through code☆372Updated 5 years ago
- Getting a handle on container security☆676Updated 2 years ago
- The Elevation of Privilege Threat Modeling Game☆336Updated last year
- 👤 Identity and Access Management knowledge for cloud platforms☆2,145Updated last month
- ☆557Updated this week
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆334Updated last month
- An open source threat modeling tool from OWASP☆1,283Updated this week
- An open source, online threat modelling tool from OWASP☆484Updated 6 months ago
- CyberArk Conjur automatically secures secrets used by privileged users and machine identities☆906Updated 2 months ago
- Repository for the Open Security Reference Architecture☆133Updated 3 weeks ago
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,253Updated last month
- A Pythonic framework for threat modeling☆1,089Updated last week
- A set of guidelines and best practices for an awesome engineering team☆262Updated last month
- Supply-chain Levels for Software Artifacts☆1,787Updated 3 weeks ago