vikrum / SecurityChecklistsLinks
The SaaS CTO Security Checklist Redux, The DevOps Security Checklist, and The Personal Infosec & Security Checklist
☆25Updated 3 years ago
Alternatives and similar repositories for SecurityChecklists
Users that are interested in SecurityChecklists are comparing it to the libraries listed below
Sorting:
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆39Updated 3 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated last year
- ☆10Updated last year
- ☆21Updated 2 years ago
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ATHI — An AI Threat Modeling Framework for Policymakers☆51Updated last year
- A collection of diagramming tools to help create DevOps/DevSecOps reference architectures☆69Updated last year
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Updated 4 years ago
- Docker container bundling tools for manual AWS security reviews☆13Updated 6 years ago
- A security checklist for anyone who's developing and deploying APIs☆21Updated 2 years ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them…☆19Updated last month
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated last year
- Glossary of security terms☆12Updated 3 years ago
- ☁ ️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆100Updated 3 years ago
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆13Updated 7 months ago
- ☆12Updated 3 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 3 years ago
- The SOCless automation framework☆139Updated 3 months ago
- Slides from presentations I give!☆25Updated last month
- A public repository with scripts and tools for mass / automated onboarding of cloud accounts (AWS,Azure,GCP)☆23Updated 4 years ago
- Python library for examining, creating and optimising IAM policies☆22Updated 2 years ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Examples, samples, snippets and scripts to use with Steampipe.☆52Updated 10 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Solution to setup a recurring Security Hub CSV full report with email notification to provide detailed report of the security posture.☆21Updated 2 months ago
- A collection of awesome security controls mapping for solutions across frameworks.☆56Updated 5 years ago
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆22Updated 8 months ago