Skip to main content
Back to top
Ctrl
+
K
Open Security Reference Architecture
Search
Ctrl
+
K
Prevention
Simplify Prevention
Create a solution
Simple Checklists
Dead simple security checklist
OpenSSF Best Practices Badge
Reproducible builds
OWASP Top 10
OpenSSF Scorecard
Linux workstation security checklist
Minimum Viable Secure Product
API Security Checklist
Content Security Policy (CSP)
Checklist Repository(NCP)
Evaluating Open Source Software
Checklist for Developing More Secure Software
Ransomware Checklist
Simple Solutions
Hardening
Protection
Security policies
Security Guidelines ((MoJ)
ISO/IEC 27001
Mattermost Security Policy
Example of NASA
Example of an university
Example of a government
ETSI Critical Security Controls for Effective Cyber Defence
Security classifications
Data Classification Standard (Berkeley)
Data Classification Policy
Find vulnerabilities
Security Management
Security Solutions
Architecture
Frameworks
Reference Architecture
Security Models
Attack vectors
Common Attack vectors
Threat Landscape for Supply Chain Attacks
CWE Top 25 Most Dangerous Software Weaknesses
CWE Most Important Hardware Weaknesses
Threat Models
STRIDE
CVSS
Security Cards
OCTAVE Approach
Security Principles
Mozilla Security Principles
Mozilla Data Privacy Principles
NCSC:Secure design principles
NCSC:Zero trust principles
NCSC:Secure communication principles
Saltzer and Schroeder’s design principles
Zero Trust principles (Microsoft)
Learning
Security Courses
Open Access Books
Security By Design
Secure Coding Guidelines
Security Testing Manuals
Secure Computing
Security References
Cryptography
Security Frameworks
Cybersecurity Research Labs
Open Security Foundations
Government security organizations
Vulnerability management
Vulnerability Databases
Security Conferences
About
Openness
Contributing
About this guide
Who
License
Repository
Open issue
Index