Security Resources

OSINT: https://osintframework.com/

MITRE Threat Hunting / Threat Models: https://medium.com/mitre-attack/getting-started-with-attack-cti-4eb205be4b2f

MITRE Attack Navigator: https://mitre-attack.github.io/attack-navigator/

ISO 27001 to CIS mappings: https://identityunderground.wordpress.com/2020/09/23/extended-mapping-of-cis-controls-to-iso27001-security-controls/

CWE Top 25 Most Dangerous Software Weaknesses:

https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html

SOC 2 to ISO/GDPR/COBIT/NIST CSF/800-53 mappings: https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/mappingsrelevanttothesocsuiteofservices

Cipher tester:

https://ciphersuite.info/

Django Password storage:

https://docs.djangoproject.com/en/3.2/topics/auth/passwords/#how-django-stores-passwords

Verizon Data Breach Investigation Report:

https://www.verizon.com/business/resources/reports/dbir/
https://www.verizon.com/business/resources/reports/2022/dbir/2022-data-breach-investigations-report-dbir.pdf

CIS benchmark details: https://www.cisecurity.org/cis-benchmarks/

CIS hardened Cloud Images: https://www.cisecurity.org/cis-hardened-image-list/

CIS Automation of Hardening (Free and Paid tools): https://www.cisecurity.org/insights/blog/how-to-automate-the-process-of-implementing-secure-configurations

CSI SAT Lite (Free) – security assessment tool: https://learn.cisecurity.org/cis-cat-lite

CIS CSAT Business Ransomware Impact Analysis Tool: https://bia.cisecurity.org/

CIS Risk Assessment: https://learn.cisecurity.org/cis-ram

Binary Risk Analysis: https://binary.protect.io/#tools

AWS EBS vs S3 storage: https://prodigy13.com/wp-admin/post.php?post=3878&action=edit


Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.

Related Articles

Security

SAML explained

SAML explained in plain English: https://www.onelogin.com/learn/saml SAML is an acronym used to describe the Security Assertion Markup Language (SAML). Its primary role in online security is

Read More
Security

Threat Hunting – Practical Guide

Resource: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf To begin, let’s clarify what threat hunting is: Threat hunting is the human-driven, proactive and iterative search through networks, endpoints, or datasets in

Read More