threat-matrix-cicd
CI pipeline security framework
A threat matrix for securing CI/CD pipelines, mapping risks and techniques to help developers understand and mitigate threats.
Threat matrix for CI/CD Pipeline
740 stars
25 watching
91 forks
last commit: over 1 year ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An analysis of common security risks in Continuous Integration/Continuous Deployment systems and processes. | 3 |
| | A deliberately vulnerable CI/CD environment designed to teach security best practices through interactive challenges | 1,967 |
| | A command-line interface to query threat intelligence data from ThreatCrowd.org | 19 |
| | A reference guide for designing effective threat detection and response pipelines | 262 |
| | A runtime security solution that monitors and mitigates attacks in software supply chains | 91 |
| | Analyzes potential security vulnerabilities in Continuous Integration/Continuous Deployment workflows and repositories. | 634 |
| | A collection of resources and training materials focused on threat hunting and cyber-threat intelligence. | 13 |
| | A unified continuous delivery solution for multiple application kinds on multi-cloud environments | 1,099 |
| | Provides a step-by-step guide to enabling Continuous Integration and Deployment on Apigee Edge using Jenkins, Git, Maven, and JMeter. | 20 |
| | An advanced threat intelligence framework that integrates real-time IP reputation and historical data analysis to identify malicious traffic | 239 |
| | A language and runtime framework for building reusable, composable threat hunting workflows using Python. | 302 |
| | Provides a collection of plans to test defenses against real-world cyber threats. | 1,737 |
| | An educational project demonstrating common security attacks and vulnerabilities in GitHub Actions CI/CD environments | 445 |
| | A framework for building and managing CI/CD pipelines and application environments with cryptographic signed dependencies. | 461 |
| | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |