The NIST Cybersecurity Framework 2.0 outlines steps to be taken by the industry, governement agencies, and small businesses in organization risk management.
-
Updated
Jun 3, 2024
The NIST Cybersecurity Framework 2.0 outlines steps to be taken by the industry, governement agencies, and small businesses in organization risk management.
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
We make Generative AI accessible to Federal agencies and businesses. Easy-to-use ezGPT™ platform eliminates the need for in-house expertise and delivers pre-built solutions for rapid innovation. With security and privacy at its core, we unlock the potential of AI. Our innovative chatbot guides users, ensuring a smooth and successful experience.
We make Generative AI accessible to Federal agencies and businesses. Easy-to-use ezGPT™ platform eliminates the need for in-house expertise and delivers pre-built solutions for rapid innovation. With security and privacy at its core, we unlock the potential of AI. Our innovative chatbot guides users, ensuring a smooth and successful experience.
The SIMP Product Documentation
This tool allows you to prioritize MITRE ATT&CK techniques for your adversaries and collect corresponding NIST SP 800-53 security controls.
Automated security control prioritization using sector-based threat profiles
Overview of existing mappings from and to cyber security controls
Leverage Ollion's AWS Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite cloud migration for an enterprise in a heavily regulated industry.
crypto; from kruptein to hide or conceal
Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace
Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite cloud migration for an enterprise in a heavily regulated industry.
Official OSSEC docker container
Puppet module that hardens Windows Server to DoD STIG compliance
docker modsecurity reverse proxy WAF based on nginx
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
Sonarqube cloudformation plugin, IaC security supports cfn-nag/checkov
Add a description, image, and links to the nist800-53 topic page so that developers can more easily learn about it.
To associate your repository with the nist800-53 topic, visit your repo's landing page and select "manage topics."