Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure
-
Updated
Apr 10, 2026
Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellence Through Public ISMS Disclosure
𝗖𝟯 provides compliant AWS CDK components to various security standards.
Overview of existing mappings from and to cyber security controls
Automated security control prioritization using sector-based threat profiles
Compliance-as-Code lab using AWS Config, EventBridge, and Lambda auto-remediation with CloudFormation.
Comprehensive security hardening toolkit for Fedora Linux systems with enterprise-grade UX and cross-platform compatibility
Enterprise PowerShell module for comprehensive Active Directory security auditing. Features 9 security modules, Microsoft compliance coverage, CI/CD integration, SQLite database, and comprehensive reporting. Perfect for security teams and M&A due diligence.
NIST SP 800-171 controls matrix with all 110 requirements mapped to NIST 800-53, CMMC 2.0, CIS Controls, and ISO 27001.
Curated, machine-readable cybersecurity reference library — frameworks, standards, government advisories, threat reports, and breach analyses.
Python tool for mapping security controls across frameworks like NIST CSF and ISO 27001
Validate and test security controls to ensure they are working effectively
All 56 CIS Controls v8 IG1 safeguards mapped to Microsoft 365 Business Premium features with admin portal paths. Includes coverage heatmap, implementation tracker, executive report, and 6-wave rollout sequence. 61% of controls fully addressable at zero additional cost.
Profile repo for Nigel Roberts (CISSP), founder of NexSecure Solutions LLC. Cybersecurity for SMBs: risk assessments, vCISO, NIST/CIS/HIPAA alignment, cloud & endpoint hardening.
Cybersecurity risk assessment conducted for a nonprofit organization, aligned with CIS Critical Controls, covering enterprise, data, network, and endpoint security
Ferramenta web para automação de auditoria de conformidade com os CIS Controls. Desenvolvida em Python com Django, a aplicação processa planilhas de auditoria, gera gráficos interativos com Plotly e facilita a análise de dados para segurança da informação.
30 hands-on labs implementing CIS-aligned security controls across hardening, logging, SIEM, encryption, backup validation, and incident response.
SAMA CSF Assessment Tool — Saudi Central Bank Cybersecurity Framework | Bilingual AR/EN | 4 Domains · 114 Controls · 6 Maturity Levels | ISO 27001 · NIST · CIS · PCI-DSS · NCA Mappings | Offline-First
Complete cybersecurity governance program for a 55-person Caribbean healthcare provider. Risk register, 5 security policies, IR plan with escalation tree, executive risk briefing, and 12-month remediation roadmap. Dual-mapped to NIST CSF 2.0 and CIS Controls v8 IG1.
AI-powered security assessment orchestrator with MCP protocol. Automated planning, parallel tool execution (nmap, nuclei, OSINT), risk scoring, OWASP/CIS compliance mapping, and HTML report generation. For authorized testing only.
A comprehensive, interactive educational platform for learning and implementing the 18 CIS Critical Security Controls with open-source tools and practical guidance.
Add a description, image, and links to the cis-controls topic page so that developers can more easily learn about it.
To associate your repository with the cis-controls topic, visit your repo's landing page and select "manage topics."