vikrum / SecurityChecklists
The SaaS CTO Security Checklist Redux, The DevOps Security Checklist, and The Personal Infosec & Security Checklist
☆23Updated 3 years ago
Alternatives and similar repositories for SecurityChecklists:
Users that are interested in SecurityChecklists are comparing it to the libraries listed below
- A curated collection of tools and resources for building security with a developer first approach.☆28Updated 2 years ago
- SOC 2 should be easy to get done and it should be inexpensive. Here's everything you wanted to know.☆30Updated 2 months ago
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆9Updated last year
- Sample DevSecOps pipelines (heavily biased on the "Sec") for various stacks and tools using open-source security tools and AWS native ser…☆67Updated 3 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆35Updated 3 years ago
- Examples, samples, snippets and scripts to use with Steampipe.☆51Updated 5 months ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆23Updated 2 years ago
- A collection of diagramming tools to help create DevOps/DevSecOps reference architectures☆65Updated last year
- ☆21Updated last year
- Are AWS Well-Architected best practices being followed? Use Powerpipe and Steampipe to check if your AWS accounts are following best prac…☆12Updated 2 months ago
- A project to visualize the software supply chain☆37Updated last year
- Use SQL to instantly query calendar events, drive files, gmail messages, and more from Google Workspace. Open source CLI. No DB required.☆19Updated 2 months ago
- A schema and set of tools for using SQL to query cloud infrastructure.☆66Updated 3 years ago
- https://breaches.cloud☆36Updated 3 months ago
- ☆10Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS across all of your GCP projects usin…☆38Updated 2 months ago
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- ATHI — An AI Threat Modeling Framework for Policymakers☆47Updated last year
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆98Updated 3 years ago
- NIST OSCAL SDK and CLI☆18Updated 6 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controls☆14Updated last week
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆36Updated last year
- Template SOC2 Policy Authority - documentation pipeline☆106Updated 4 years ago
- A catalog designed for environments with multiple or diffuse Information Security vulnerability-related information sources.☆12Updated last year
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Updated 3 years ago
- Curated List of all AWS Well-Architected Resources☆22Updated 4 years ago
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14Updated 2 years ago
- Is your AWS tagging strategy following best practice? This mod checks if your AWS resource tags are set correctly to help you manage them…☆19Updated 2 months ago