Get Scout setup in minutes, and let us sweat the small stuff. A couple lines in settings.py is all you need to start monitoring your apps. Sign up for our free tier today. Learn more →
Attack-control-framework-mappings Alternatives
Similar projects and alternatives to attack-control-framework-mappings
-
-
Scout Monitoring
Free Django app performance insights with Scout Monitoring. Get Scout setup in minutes, and let us sweat the small stuff. A couple lines in settings.py is all you need to start monitoring your apps. Sign up for our free tier today.
-
-
-
-
caldera_pathfinder
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
-
tram
TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&CK®.
-
-
InfluxDB
Purpose built for real-time analytics at any scale. InfluxDB Platform is powered by columnar analytics, optimized for cost-efficient storage, and built with open data standards.
-
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
-
-
-
Threat-Intelligence-telegram
A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.
attack-control-framework-mappings discussion
attack-control-framework-mappings reviews and mentions
-
Is there a Mitre Att&ck mapping to NIST Threat Events?
Here's a mapping to 800-53: https://ctid.mitre-engenuity.org/our-work/nist-800-53-control-mappings/
- NIST 800-53 Control Mappings to MITRE ATT&CK. Pretty handy, if you like that sort of thing…
-
What are the most important metrics for measuring cloud and endpoint security?
BlindSPOT: https://blindspotsec.com/ Specific graphic from BlindSPOT: https://blindspotsec.com/wp-content/uploads/2021/04/Failure_Before.jpg How to Measure Anything in Cybersecurity Risk: https://www.amazon.com/dp/B01J4XYM16/ Monte Carlo simulation approach: https://embracethered.com/blog/posts/2020/red-teaming-and-monte-carlo-simulations/ D3FEND: https://d3fend.mitre.org/ ATT&CK mappings: https://github.com/center-for-threat-informed-defense/attack-control-framework-mappings ATT&CK evals: https://attackevals.mitre-engenuity.org/index.html CALDERA: https://github.com/mitre/caldera Offensive Countermeasures: https://www.amazon.com/dp/1974671690/ SPIFFE: https://spiffe.io/ SPIRE: https://github.com/spiffe/spire Zerotier: https://www.zerotier.com/ Zerotier libzt: https://github.com/zerotier/libzt
-
A note from our sponsor - Scout Monitoring
www.scoutapm.com | 11 Sep 2024
Stats
center-for-threat-informed-defense/attack-control-framework-mappings is an open source project licensed under Apache License 2.0 which is an OSI approved license.
The primary programming language of attack-control-framework-mappings is Python.
Popular Comparisons
- attack-control-framework-mappings VS caldera
- attack-control-framework-mappings VS attack-stix-data
- attack-control-framework-mappings VS caldera_pathfinder
- attack-control-framework-mappings VS ZeroTier
- attack-control-framework-mappings VS tram
- attack-control-framework-mappings VS libzt
- attack-control-framework-mappings VS adversary_emulation_library
- attack-control-framework-mappings VS PrivacyEngCollabSpace
- attack-control-framework-mappings VS enterpriseattack
- attack-control-framework-mappings VS Threat-Intelligence-telegram