-
Hi,
Thanks for great software! i really appreciate it!
We are now using Govready-q into our pipelines, and trying to fit Govready-q into threat modelling, thats why i think we need Weighted Que…
-
- https://owasp.org/www-pdf-archive/OWASP_SCP_Quick_Reference_Guide_v2.pdf
- https://www.reddit.com/r/linuxupskillchallenge/
AOrps updated
3 months ago
-
Tarea para hacer seguimiento de la creación de contenido para el día 2 acerca de seguridad
- [x] Análisis estático de Código Fuente (Static Analysis)
- [x] Cumplimiento de normativas de Seguridad …
-
Reverse proxies come in two forms:
- An authenticating proxy, where the proxy authenticates the client before creating a session in which requests are forwarded to the back-end service.
- A transp…
-
I made a simple system model to test the risk-report algorithm and have found a bug in the Java attack path code.
The model is "small-uncontrolled" ([small-uncontrolled 2024-05-19T11_41.nq.gz](http…
-
as a CLA AWS account admin
I want to be alerted whenever another admin assumes a high privileged role
so that I can confirm that it is a legitimate need or a misuse attempt
# context
as part o…
ghost updated
3 years ago
-
https://docs.google.com/document/d/1lLCsT0a5vp6FcvquWPzx8AzhFMORyw-4rd9WSyUO9zI/edit?usp=sharing
-
Create an enterprise architecture and accompanying threat model to identify the threats that we need to address as part of the "sterling toolchain" and validate existing standards.
High level goals…
-
### Introduction
I dag har vi noen ganske like konsepter (se tittel) hvor grensene mellom dem er noe uklare. Kan vi konsolidere disse konseptene og dermed forbedre toolingen/koden vår?
### Descrip…
-
**Describe the bug**
Not a bug, not a feature request, not a security vulnerability announcement with a fix I can provide, but security related so this is the closest fit available
**Additional co…