cti
heimdall2
cti | heimdall2 | |
---|---|---|
1 | 4 | |
1,641 | 197 | |
1.0% | 3.0% | |
6.0 | 9.9 | |
13 days ago | 5 days ago | |
TypeScript | ||
GNU General Public License v3.0 or later | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cti
heimdall2
- CSPM opensource suggestions
-
CIS Benchmark deployment approach
Take a look at https://github.com/mitre/heimdall2 and https://github.com/mitre/saf. Data from scans and other tools can be converted to the Heimdall2 format using SAF, and SAF can use Inspec profiles to harden (https://saf.mitre.org/#/harden) and validate (https://saf.mitre.org/#/validate).
- Tooling for Purple Teaming
- Checking compliance of controls? Job help
What are some alternatives?
VECTR - VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities across different attack scenarios
OSCAL - Open Security Controls Assessment Language (OSCAL)
stix2.1-coa-playbook-extension - A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-readable security playbooks such as CACAO Security Playbooks
inspec - InSpec: Auditing and Testing Framework
attack-stix-data - STIX data representing MITRE ATT&CK
macos_security - macOS Security Compliance Project
saf - The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
cloudsploit - Cloud Security Posture Management (CSPM)
attack-flow - Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
prowler - Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more