Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe and Steampipe.
-
Updated
May 15, 2024 - HCL
Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Powerpipe and Steampipe.
Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking. https://gapps.darkbanner.com
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
This is a visualization that I developed to help when discussing the functions of the NIST CSF
Overview of existing mappings from and to cyber security controls
Use the NIST Cybersecurity Framework to respond to a security incident.
A multimedia company that offers web design services, graphic design, and social media marketing solutions to small businesses recently experienced a DDoS attack, which compromised the internal network for two hours until it was resolved using NIST-CSF.
A mock security incident report done as part of Cybersecurity documentation portfolio and Google's Coursera Cybersecurity Certificate.
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
Add a description, image, and links to the nist-csf topic page so that developers can more easily learn about it.
To associate your repository with the nist-csf topic, visit your repo's landing page and select "manage topics."