vikrum / SecurityChecklists
The SaaS CTO Security Checklist Redux, The DevOps Security Checklist, and The Personal Infosec & Security Checklist
☆23Updated 3 years ago
Related projects: ⓘ
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆22Updated 3 weeks ago
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆19Updated 2 years ago
- Documenting SOC 2 tools and processes☆62Updated 2 years ago
- Super-powered know how tools for AWS and GCP cloud security☆14Updated last year
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆14Updated 2 weeks ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆44Updated last year
- Examples, samples, snippets and scripts to use with Steampipe.☆50Updated last month
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆35Updated 3 weeks ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Updated 2 years ago
- A carefully curated list of open source projects aimed at improving your AWS security posture!☆29Updated 2 years ago
- DefectDojo Community Content☆17Updated 5 months ago
- ☆31Updated 5 months ago
- A project to visualize the software supply chain☆33Updated last year
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆39Updated 6 months ago
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆11Updated 6 months ago
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆9Updated 10 months ago
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them…☆19Updated last month
- ☆18Updated 2 months ago
- Golang installer for DefectDojo☆23Updated 4 months ago
- Generated a compliance checklist report, asset register and risk register. Implemented policies on various controls of ISO27001:2013 stan…☆26Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated 8 months ago
- ☆15Updated this week
- Security Blueprint for Startups☆38Updated 4 years ago
- ☆46Updated this week
- ☆38Updated this week
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Updated 3 years ago
- Holds the public Hacking the Cloud CTFs.☆50Updated 6 months ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆97Updated 3 years ago