vendorsec / mvspLinks
Minimum Viable Secure Product mvsp.dev
☆204Updated last year
Alternatives and similar repositories for mvsp
Users that are interested in mvsp are comparing it to the libraries listed below
Sorting:
- Security policies for Tailscale☆304Updated last week
- App that simplifies building decision trees to model adverse scenarios☆224Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated last month
- ☆137Updated this week
- boostsecurityio/poutine☆354Updated last week
- Open Source Software Secure Supply Chain Framework☆239Updated 3 years ago
- An open-source collection of API key rotation tutorials.☆76Updated 4 months ago
- A tool to check the security settings of Github Organizations.☆75Updated 2 years ago
- Gram is Klarna's own threat model diagramming tool☆329Updated 3 weeks ago
- Documenting your Threat Models with HCL☆453Updated 3 weeks ago
- A Software as a Service (SaaS) log collection framework.☆180Updated this week
- ☆115Updated 5 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆114Updated last week
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆135Updated 2 months ago
- The purpose of the Metrics & Metadata (formerly Identifying Security Threats) working group is to enable stakeholders to have informed co…☆223Updated last year
- The security workflow engine!☆135Updated 2 months ago
- Awesome secure by default libraries to help you eliminate bug classes!☆699Updated last month
- Segment's Threat Modeling training for our engineers☆244Updated 4 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆214Updated this week
- The Elevation of Privilege Threat Modeling Game☆336Updated last year
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆47Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆334Updated last month
- OCSF Documentation☆151Updated 3 months ago
- Graph-based security analysis for everyone☆354Updated last month
- Compares and analyzes GCP IAM roles.☆78Updated 10 months ago
- ☆99Updated 3 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆158Updated last year
- Open-source best practices for protecting a secure, sensible cloud platform☆129Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Updated 2 weeks ago
- 💅🏽 analyzes your github actions☆97Updated 2 weeks ago