Skip to content
#

security-hardening

Here are 276 public repositories matching this topic...

Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

  • Updated Jul 20, 2022
  • Shell
prowler

Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 240 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.

  • Updated Jul 21, 2022
  • Shell
ggbecker
ggbecker commented Apr 20, 2022

Extend macro function that creates OCIL entries for package removed rules to support both package removed/installed rules using an extra parameter to define the behavior of the ocil_clause (the ocil clause "package is installed" for removed package rules and "package is not installed" for installed package rules)

https://github.com/ComplianceAsCode/content/blob/fe68fcd788b85eed7559e6174d71a67

good first issue
xXx-caillou-xXx
xXx-caillou-xXx commented Aug 11, 2019

Hi,
It seems like there is an error in the reporting of invalid configuration.

Using this configuration file:

# This
# is
# a
# comment
sp.does_not_exist.enable();

I get:

PHP message: PHP Fatal error:  [snuffleupagus][config] Invalid configuration file in Unknown on line 0

I'm using the latest version of master, with php7.3-fpm.
I can do a PR for this, but I

ElectricEye

Continuously monitor your AWS attack surface and evaluate services for configurations that can lead to degradation of confidentiality, integrity or availability. All results can be exported to Security Hub, JSON, CSV, Databases, and more for further aggregation and analysis.

  • Updated Jun 14, 2022
  • Python
empijei
empijei commented Nov 22, 2021

A nice feature of http.Mux is that it can be used as a handler, so users can set up separate parts of an application on separate muxes that share a common configuration (e.g. a set of interceptors) and then install them on the root mux.

This is currently not possible with GSW, and we should seriously consider doing it.

enhancement good first issue core v0.2

Improve this page

Add a description, image, and links to the security-hardening topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the security-hardening topic, visit your repo's landing page and select "manage topics."

Learn more