#shell #assessment #aws #aws_auditing #aws_cli #cis #cis_benchmark #cloud #cloudtrail #compliance #forensics #gdpr #hardening #hipaa #prowler #security #security_audit #security_hardening #security_tools #well_architected
https://github.com/toniblyx/prowler
https://github.com/toniblyx/prowler
GitHub
GitHub - prowler-cloud/prowler: Prowler is the world’s most widely used open-source cloud security platform that automates security…
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment. - prowler-cloud/prowler
#shell #auditing #compliance #devops #devops_tools #gdpr #hardening #hipaa #linux #pci_dss #security_audit #security_hardening #security_scanner #security_tools #security_vulnerability #system_hardening #unix #vulnerability_assessment #vulnerability_detection #vulnerability_scanners
https://github.com/CISOfy/lynis
https://github.com/CISOfy/lynis
GitHub
GitHub - CISOfy/lynis: Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing…
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional. - CISOf...
#typescript #compliance #data_anonymization #devsecops #gdpr #hardening #immutable_database #pci_dss #privacy_by_design #security #soc2 #tokenization #web_security #zero_trust
https://github.com/lunasec-io/lunasec
https://github.com/lunasec-io/lunasec
GitHub
GitHub - lunasec-io/lunasec: LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell…
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the Luna...
#jinja #ansible #ansible_collection #collection #devsec #hacktoberfest #hardening #linux #mysql_hardening #nginx #nginx_hardening #os_hardening #playbook #protection #role #ssh_hardening #sysctl
devsec.hardening is an Ansible collection that battle-tests security hardening for Linux (CentOS, AlmaLinux, Rocky, Debian, Ubuntu, etc.), MySQL, Nginx, and SSH, matching DevSec Inspec baselines. Install via `ansible-galaxy collection install devsec.hardening` and apply roles like os_hardening easily. It saves you time by automating secure configs across servers, cuts manual work, boosts compliance, and shrinks attack surfaces for safer systems.
https://github.com/dev-sec/ansible-collection-hardening
devsec.hardening is an Ansible collection that battle-tests security hardening for Linux (CentOS, AlmaLinux, Rocky, Debian, Ubuntu, etc.), MySQL, Nginx, and SSH, matching DevSec Inspec baselines. Install via `ansible-galaxy collection install devsec.hardening` and apply roles like os_hardening easily. It saves you time by automating secure configs across servers, cuts manual work, boosts compliance, and shrinks attack surfaces for safer systems.
https://github.com/dev-sec/ansible-collection-hardening
GitHub
GitHub - dev-sec/ansible-collection-hardening: This Ansible collection provides battle tested hardening for Linux, SSH, nginx,…
This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL - dev-sec/ansible-collection-hardening