Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for compliance security automation
compliance
x
security-automation
x
15 search results found
Wazuh
⭐
8,176
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Content
⭐
2,065
Security automation content in SCAP, Bash, Ansible, and other formats
Bearer
⭐
1,554
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
Cfn_nag
⭐
1,105
Linting tool for CloudFormation templates
Pacbot
⭐
1,104
PacBot (Policy as Code Bot)
Betterscan Ce
⭐
673
Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners + OpenAI GPT with One Report (Code, IaC) - Betterscan Community Edition (CE)
Automate
⭐
213
Chef Automate provides a full suite of enterprise capabilities for maintaining continuous visibility into application, infrastructure, and security automation.
Saf
⭐
118
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
Intercept
⭐
74
INTERCEPT / Policy as Code Auditing / SAST for Code & APIs
Whispers
⭐
34
Identify hardcoded secrets in static structured text (version 2)
Cc Utils
⭐
19
CI/CD utils for gardener project
Prismacloud Demo
⭐
10
Complete CNAPP Demo using Prisma Cloud
Remediations Gendbuntu
⭐
9
The main goal of this project is the configuration and control of various types of devices operating in a corporate environment. Information security is the main direction of development. Roles have default settings that can be dynamically overridden using "inventories" folder rules based on subnet, host group (organizational unit or branch), OS.
Rhel8 Stig Audit
⭐
8
Audit control files for rhel8 stig - utilising goss
Docker Cloudsploit
⭐
5
dockerized-cloudsplot, CloudSploit is a security and configuration scanner that can detect hundreds of threats in your AWS account. Don't let a single misstep compromise your entire infrastructure.
1-15 of 15 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.