vendorsec / mvsp
Minimum Viable Secure Product mvsp.dev
☆188Updated last month
Alternatives and similar repositories for mvsp:
Users that are interested in mvsp are comparing it to the libraries listed below
- Security policies for Tailscale☆276Updated last week
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated last month
- ☆90Updated last month
- Open Source Software Secure Supply Chain Framework☆234Updated 2 years ago
- ☆122Updated this week
- Segment's Threat Modeling training for our engineers☆239Updated 3 years ago
- App that simplifies building decision trees to model adverse scenarios☆192Updated 6 months ago
- OCSF Documentation☆122Updated 3 weeks ago
- OpenVEX Specification☆139Updated 6 months ago
- boostsecurityio/poutine☆243Updated last week
- ☆108Updated last week
- An Open Letter to the OWASP Board☆106Updated last year
- 🖇️ STRIDE vs. ASVS equivalence table☆75Updated 4 months ago
- A tool to check the security settings of Github Organizations.☆70Updated last year
- Documenting your Threat Models with HCL☆412Updated 4 months ago
- A Software as a Service (SaaS) log collection framework.☆147Updated last month
- Cloud Commotion intends to cause chaos to simulate security incidents☆141Updated 7 months ago
- Vendor Security Model Contract☆97Updated 2 years ago
- A guide on coordinated vulnerability disclosure for open source projects. Includes templates for security policies (security.md) and disc…☆119Updated this week
- Core model including reused documentation☆92Updated 3 months ago
- A tool for preventing the installation of malicious PyPI and npm packages☆108Updated last month
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆155Updated this week
- An open-source collection of API key rotation tutorials.☆63Updated last month
- A documentation and tracking project with the goal of making package management systems more secure.☆50Updated 3 years ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆59Updated last year
- Enrich SBOMs with data from third party services☆151Updated last week
- Audit log wall of shame.☆41Updated 3 months ago
- Improve Software Bill of Materials (SBOM) tooling and training to encourage adoption☆76Updated last month
- ☆209Updated last month
- A checklist of practices for organizations dealing with account takeover (ATO)☆264Updated 3 months ago