OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
-
Updated
May 23, 2024 - C
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
We make Generative AI accessible to Federal agencies and businesses. Easy-to-use ezGPT™ platform eliminates the need for in-house expertise and delivers pre-built solutions for rapid innovation. With security and privacy at its core, we unlock the potential of AI. Our innovative chatbot guides users, ensuring a smooth and successful experience.
Open Source Multi-Cloud AWS Control Tower
An opinionated tooling platform for managing compliance as code, using continuous integration and NIST's OSCAL standard.
Leverage Ollion's GCP Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite cloud migration for an enterprise in a heavily regulated industry.
Secure SDLC process template
Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking. https://gapps.darkbanner.com
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Leverage Ollion's AWS Landing Zone to deploy a secure, compliant foundation with ease. The repository contains an implementation of a secure and compliant landing zone pattern that will help expedite cloud migration for an enterprise in a heavily regulated industry.
crypto; from kruptein to hide or conceal
We make Generative AI accessible to Federal agencies and businesses. Easy-to-use ezGPT™ platform eliminates the need for in-house expertise and delivers pre-built solutions for rapid innovation. With security and privacy at its core, we unlock the potential of AI. Our innovative chatbot guides users, ensuring a smooth and successful experience.
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Automated security control prioritization using sector-based threat profiles
Overview of existing mappings from and to cyber security controls
Vigilante Vixen has learned that there were many security vulnerabilities from their technical, behavioral, law, and human resources aspects. Despite us not being directly involved in offshore financial services or the legal profession, technology roles have a considerable amount of opportunity to review this case and implement security regulations
Built a mini HoneyNet in Azure and ingest log sources from various resources into a Log Analytics workspace
Sonarqube cloudformation plugin, IaC security supports cfn-nag/checkov
NIST Information Security Continuous Monitoring (ISCM) and configuration baseline data collector
The SIMP Product Documentation
Add a description, image, and links to the nist800-53 topic page so that developers can more easily learn about it.
To associate your repository with the nist800-53 topic, visit your repo's landing page and select "manage topics."