Skip to content
OrgSec Guide
Home
Initializing search
luisfontes19/orgsec-guide
OrgSec Guide
luisfontes19/orgsec-guide
Home
Using This Guide
The Security Team Mindset
Extra Resources
Checklist
Artificial Intelligence
Artificial Intelligence
Agents
MCP Servers
DevSecOps
DevSecOps
Container Scanning
Dast Scans
Sast Scans
SBOMs
SCA Scans
Secrets Scans
Secure Deployments
Secure the SCM Platform
Endpoint Security
Endpoint Security
Endpoint Detection And Response (EDR)
Mobile Device Management (MDM)
Phishing Strategy
GRC
GRC
Asset Inventory
Compliance And Certifications
Incident Management
Policies
Security Training
Service Level Agreement (SLA)/Operational Level Agreement (OLA) Definition
Systems Criticality
Tabletop Exercises & Simulations
Vendor Onboarding
Identity Access Management
Identity Access Management
Access Management
Multi Factor Authentication
Password Manager
Single Sign On
Infra & Cloud
Infra & Cloud
Infrastructure Scanning
Monitoring
Secure Guardrails
Secure Resource Provisioning
Web Application Firewall (WAF), Distributed Denial of Service (DDoS) and Bot Protection
Operational Security
Operational Security
Invariants Monitoring
Red Teaming Exercises
Product Security
Product Security
Code Review Process
Pentests
Responsible Vulnerability Disclosure
Secrets Management
Secure Coding Training
Secure Defaults
Security Champions
Supply Chain Management
Threat Modeling
Vulnerability Management Program
Security Operations Center
Security Operations Center
Cyber Threat Intelligence (CTI)
Threat Detection & Response (TDR)
Table of contents
Resources
DevSecOps
[TBD]
Resources
DevSecOps Guides
Back to top