OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
-
Updated
Jun 6, 2024 - C
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking. https://gapps.darkbanner.com
An opinionated tooling platform for managing compliance as code, using continuous integration and NIST's OSCAL standard.
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Open Source AWS Control Tower
A docker container for openvas
Secure SDLC process template
A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting evidence artifacts
Sonarqube cloudformation plugin, IaC security supports cfn-nag/checkov
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
docker modsecurity reverse proxy WAF based on nginx
Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite cloud migration for an enterprise in a heavily regulated industry.
Official OSSEC docker container
Puppet module that hardens Windows Server to DoD STIG compliance
Leverage Ollion's AWS Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite cloud migration for an enterprise in a heavily regulated industry.
Overview of existing mappings from and to cyber security controls
Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace
crypto; from kruptein to hide or conceal
Add a description, image, and links to the nist800-53 topic page so that developers can more easily learn about it.
To associate your repository with the nist800-53 topic, visit your repo's landing page and select "manage topics."