Official open-source GRC toolkit from the GRC Engineering Club. Claude Code plugins for evidence collection, SCF crosswalks, multi-framework gap reports, OSCAL workflows.
-
Updated
Apr 19, 2026 - JavaScript
Official open-source GRC toolkit from the GRC Engineering Club. Claude Code plugins for evidence collection, SCF crosswalks, multi-framework gap reports, OSCAL workflows.
Security architecture patterns and NIST 800-53 controls from opensecurityarchitecture.org
Centralized STIG & NIST 800-53 compliance knowledge, playbooks, and secure code templates for federal systems development.
Thermodynamic Governance Architecture for Runtime Assurance & Entropy Minimization
Compliance-as-Code lab using AWS Config, EventBridge, and Lambda auto-remediation with CloudFormation.
ALX System Engineering & DevOps portfolio with cybersecurity enhancements. Bash automation for log analysis, system hardening, incident response, zero-trust SSH, compliance auditing (CIS/NIST), threat hunting, and DevSecOps pipelines. Proven SOC analyst toolkit – built on Ubuntu 20.04.
IAM Authentication Audit Tracker is a Terraform-based AWS security lab that detects IAM login anomalies using CloudTrail, CloudWatch, SNS, and Athena. It integrates tfsec scans through GitHub Actions and demonstrates alerting, audit log analysis, and compliance mapping to NIST 800-53 (AU-6, AC-7) and ISO 27001 A.12.4 using secure IaC
Fledge: hardened macOS platform for autonomous AI agents. Security-first n8n orchestration from hello world to production.
A browser-based Microsoft Defender for Endpoint audit tracker for MSSP security engineers, mapping ~270 tasks across multiple frameworks including — NIST CSF 2.0, Cyber Essentials, SOC 2, and NIST 800-53. Features per-task status, notes, live progress metrics, framework switching, dark/light mode, and CSV, HTML, and JSON export.
Lightweight Python CLI tool that scans AWS IAM policy JSON files for overly permissive statements and maps findings to CJIS v6.0, FedRAMP, and NIST 800-53 compliance controls.
Security-focused agent skills for service mesh analysis, compliance reporting, and remediation
A structured cyber risk management plan modeled on NIST guidance. Includes threat identification, impact assessment, control mapping, and mitigation strategies.
AWS Organization baseline configuration
Production security infrastructure with Wazuh SIEM, defense-in-depth architecture, and NIST 800-53 mapping across 20+ self-hosted services
NIST SP 800-171 controls matrix with all 110 requirements mapped to NIST 800-53, CMMC 2.0, CIS Controls, and ISO 27001.
Automated compliance as code for hybrid cloud hardening. NIST Hardening Suite converts NIST 800-53 controls into executable, auditable Ansible workflows that reduce drift and support SOC 2 and DORA evidence mapping.
Automated AWS compliance guardrails using Service Control Policies and CloudFormation. Controls enforce audit log protection, encryption at rest, boundary protection, and least functionality, mapped to CJIS Security Policy v6.0, FedRAMP High baseline, and NIST 800-53 Rev. 5.
NIST 800-53 compliance automation — OSCAL artifacts, assessment results, SSP, and evidence pipeline
IAM Authentication Audit Tracker is a Terraform-based AWS security lab that detects IAM login anomalies using CloudTrail, CloudWatch, SNS, and Athena. It integrates tfsec scans through GitHub Actions and demonstrates alerting, audit log analysis, and compliance mapping to NIST 800-53 (AU-6, AC-7) and ISO 27001 A.12.4 using secure IaC
Terraform provider for Technitium DNS Server with STIG-hardened defaults and CNSSI 1253 compliance support
Add a description, image, and links to the nist-800-53 topic page so that developers can more easily learn about it.
To associate your repository with the nist-800-53 topic, visit your repo's landing page and select "manage topics."