zero-trust-architecture
Zero Trust Design
Guidance on designing and deploying zero-trust architectures to protect enterprise environments
Principles to help you design and deploy a zero trust architecture
2k stars
72 watching
170 forks
last commit: almost 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A security guide for building robust and reliable applications in serverless architectures | 333 |
| Tools for internal network penetration testing and vulnerability assessment | 498 |
| An analysis of common security risks in Continuous Integration/Continuous Deployment systems and processes. | 3 |
| A collection of custom GitHub settings and configuration files for a software project | 0 |
| A knowledge base documenting exploit mitigations across various operating systems and software | 880 |
| A guide to establishing a Security Champions program in software teams | 353 |
| A collection of practical security-focused guides and checklists for smart contract development | 1,076 |
| A demonstration project for building a WeChat Mini Program | 698 |
| Provides tools, exploits, and code snippets for security research and education purposes. | 39 |
| Release of operational data from a technology transition pilot study aimed at scaling cyber defense capabilities | 96 |
| Provides a ZeroMQ transport protocol implementation for the Obvs Reactive Extensions wrapper | 9 |
| Developing a comprehensive documentation set for a lane assistance system to ensure its functional safety | 84 |
| Operational guidelines and best practices for handling various types of security incidents | 982 |
| A curated collection of security resources for developers and security professionals | 1,742 |
| A collection of resources and tools for the development and design of integrated circuits and electronic systems | 100 |