vikrum / SecurityChecklists
The SaaS CTO Security Checklist Redux, The DevOps Security Checklist, and The Personal Infosec & Security Checklist
☆23Updated 3 years ago
Alternatives and similar repositories for SecurityChecklists:
Users that are interested in SecurityChecklists are comparing it to the libraries listed below
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 3 years ago
- A security checklist for anyone who's developing and deploying APIs☆21Updated 2 years ago
- A collection of diagramming tools to help create DevOps/DevSecOps reference architectures☆66Updated last year
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆99Updated 3 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆37Updated last year
- ☆10Updated last year
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆15Updated last week
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆12Updated 3 months ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆37Updated 3 years ago
- Examples, samples, snippets and scripts to use with Steampipe.☆52Updated 6 months ago
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆57Updated 3 weeks ago
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 2 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Glossary of security terms☆12Updated 3 years ago
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆32Updated 3 months ago
- A list of questions that can be asked during an interview for a cloud architect position.☆11Updated 3 years ago
- A collection of awesome security controls mapping for solutions across frameworks.☆55Updated 4 years ago
- Use SQL to instantly query calendar events, drive files, gmail messages, and more from Google Workspace. Open source CLI. No DB required.☆19Updated 3 months ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆19Updated last year
- ☆21Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Sqreen Security Checklist Transformer & Uploader☆27Updated 3 years ago
- The Open Security Summit is focused on the collaboration between, Developers and Application Security☆45Updated 2 months ago
- Template SOC2 Policy Authority - documentation pipeline☆108Updated 4 years ago
- An extreme bootcamp to enable teams to build DevSecOps into their environment.☆9Updated 8 years ago
- The CCPA Checklist☆12Updated last year
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 9 months ago