cybnity / foundation

Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create resilient digital systems with efficient responses against to cyber-threats.
Apache License 2.0
15 stars 2 forks source link
cyber-security cybersecurity governance isms iso27001 java nist platform software

image

Let's Make Safe Digital World!

CYBNITY open source cybersecurity platform help you to govern the cyber defense of your digital assets for operate them with complete serenity.

PURPOSE

Welcome on the CYBNITY open souce program which target to deliver a security platform efficient and flexible for each company with need to design its Information Security Management System (ISMS) and/or to operate digital systems in a secure way against the cyberthreats.

Our Mission

We develop an open source technological defense platform to help the security teams designing and managing companies’ security solutions, create sustainable digital systems with efficient responses against to cyber-threats.

How It Works?

The CYBNITY platform makes it possible to design the strategic governance of the digital assets cybersecurity, and to pilot tactical operational protection systems guaranteeing the neutralization of security incidents.

WHAT CYBERSECURITY PROBLEM THE PROJECT SOLVE?

#### For any organization with complex areas to defend: ![image](https://user-images.githubusercontent.com/16148082/161939922-237cf488-e99b-4d0f-b33a-f89ebed459aa.png) #### Who want to design, implement, manage and keep control of any custom Information Security Management System (ISMS): ![companies-design-isms-with-CYBNITY](https://user-images.githubusercontent.com/16148082/161939018-f2a3e3aa-7554-4176-9b21-388b085607b0.png)

WHAT WE BUILD?

We develop a technology, deployable as a platform (in-house, on-cloud, in hybrid environment) based on a modular architecture, that support security activities performed by security teams (e.g CISO, ISSO, Risk Executive, RSSI...) with easy implementation of standard (e.g NIST, ISO/IEC 27001, IEC 62443...). #### Modular architecture ![image](https://user-images.githubusercontent.com/16148082/161945892-1b72d3b7-a54a-4364-a005-7931b65a6938.png) #### Security activities supported ![image](https://user-images.githubusercontent.com/16148082/161945718-165c5838-e1ca-43df-b70a-f3448ee910e7.png) ### Our Design Approach Several security domains are covered by our targeted architecture model, implementing a Domain-Driven-Development approach. #### Operational Cockpits (User Interfaces) We capitalize experiences and best defense practices (e.g military or police systems/methods) to build tactical tools integared suite allowing dynamic build according to the deployment context of companies and/or to a risk situation in progress. ![image](https://user-images.githubusercontent.com/16148082/161947956-6d6cffb6-11f6-4ecd-a669-7faa89ef2f64.png) #### Applications (domain contexts) ![image](https://user-images.githubusercontent.com/16148082/161947182-720d987a-e1d0-4a5f-a043-571fa03f0270.png)

THE PROGRAM

Our Methods

BUILD PROCESS

The idea creation process implemented by the project (for definition of more relevant features to develop for enhance the solution), is based on a mix of inspirations coming from proprietary solutions available on the market (maturity level to have), standards and frameworks relevant for the companies (e.g regulation to support), problems and need meet by customers (e.g companies with digital assets, electronic solutions manufacturers) and contextual drivers (e.g countries conflicts increasing cyber-attacks). ![image](cybnity-product-build-process.png)

DELIVERY PROCESS

![image](https://user-images.githubusercontent.com/16148082/161949445-0c2ab441-745e-44d4-972b-f24cb7680fbd.png)

Support & Docs

OTHER RESOURCES

COMMUNICATION CHANNELS