ukncsc / zero-trust-architectureLinks
Principles to help you design and deploy a zero trust architecture
☆1,679Updated 2 years ago
Alternatives and similar repositories for zero-trust-architecture
Users that are interested in zero-trust-architecture are comparing it to the libraries listed below
Sorting:
- NCSC Guidance for secure development and deployment☆445Updated 7 years ago
- A curated collection of awesome resources for the zero-trust security model.☆750Updated 2 years ago
- Random questions to ask during interviews.☆468Updated 6 years ago
- 👨💻Learning Path for Programmers https://roadmap.now.sh☆265Updated 2 years ago
- A collection of refactoring recipes that are provably safe. They never accidentally introduce nor fix a bug, including one that you don't…☆271Updated last year
- Logging Made Easy☆712Updated last year
- A notation for small commits messages that show the risk involved in each step☆332Updated last month
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,543Updated 10 months ago
- threatspec - continuous threat modeling, through code☆357Updated 4 years ago
- An open source, online threat modelling tool from OWASP☆484Updated 11 months ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆634Updated last year
- GitHub App to set and enforce security policies☆1,330Updated this week
- Repository for the Open Security Reference Architecture☆126Updated 2 weeks ago
- This repo has been replaced by https://www.cloudvulndb.org☆726Updated 2 years ago
- Graph platform for Detection and Response☆692Updated 2 years ago
- A repository for using osquery for incident detection and response☆850Updated 2 years ago
- Fast and efficient osquery management☆448Updated this week
- Threat matrix for CI/CD Pipeline☆751Updated 10 months ago
- Draw.io libraries for threat modeling diagrams☆747Updated 4 years ago
- 🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.☆3,878Updated last week
- A knowledge base of actionable Incident Response techniques☆639Updated 3 years ago
- CSA Guidance☆217Updated 8 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆980Updated last month
- all paths lead to clouds☆638Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,070Updated 6 months ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆794Updated 2 years ago
- 🔐CNCF Security Technical Advisory Group -- secure access, policy control, privacy, auditing, explainability and more!☆2,188Updated last month
- Curating the best DevSecOps resources and tooling.☆1,516Updated 10 months ago
- CIS Docker Benchmark - InSpec Profile☆507Updated 2 years ago
- A Pythonic framework for threat modeling☆1,003Updated this week