zero-trust-architecture
Zero Trust Design
Guidance on designing and deploying zero-trust architectures to protect enterprise environments
Principles to help you design and deploy a zero trust architecture
2k stars
72 watching
170 forks
last commit: over 2 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A security guide for building robust and reliable applications in serverless architectures | 333 |
| | Tools for internal network penetration testing and vulnerability assessment | 498 |
| | An analysis of common security risks in Continuous Integration/Continuous Deployment systems and processes. | 3 |
| | A collection of custom GitHub settings and configuration files for a software project | 0 |
| | A knowledge base documenting exploit mitigations across various operating systems and software | 880 |
| | A guide to establishing a Security Champions program in software teams | 353 |
| | A collection of practical security-focused guides and checklists for smart contract development | 1,076 |
| | A demonstration project for building a WeChat Mini Program | 698 |
| | Provides tools, exploits, and code snippets for security research and education purposes. | 39 |
| | Release of operational data from a technology transition pilot study aimed at scaling cyber defense capabilities | 96 |
| | Provides a ZeroMQ transport protocol implementation for the Obvs Reactive Extensions wrapper | 9 |
| | Developing a comprehensive documentation set for a lane assistance system to ensure its functional safety | 84 |
| | Operational guidelines and best practices for handling various types of security incidents | 982 |
| | A curated collection of security resources for developers and security professionals | 1,742 |
| | A collection of resources and tools for the development and design of integrated circuits and electronic systems | 100 |