Principios e Boas Práticas sobre Desenvolvimento Seguro
-
Updated
Apr 1, 2024
Principios e Boas Práticas sobre Desenvolvimento Seguro
🔐 Securing Your Digital Sanctuary, Trust None, Protect Everything.
FAANG (MANGA) Security Engineer Interview Collection. An ongoing & curated collection of awesome software, frameworks and libraries, learning tutorials and videos, technical guidelines and best practices, and cheatsheets in the world of Security Engineering Career.
LLM | Security | Operations in one github repo with good links and pictures.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about DevSecOps in Cybersecurity.
Firewall-System based on OpenWRT or Pi-Hole with UnBound, TOR, optional Privoxy, opt. ntopng and opt. Configuration of the AVM FRITZ!Box with Presets for Security and Port-List. Please visit:
Conceitos sobre Security-by-Design e alguns passos sobre como implementar isso no dia-a-dia.
Research and Development for Cybersecurity Engineering. Our mission is to develop a scientific theory of cybersecurity and a toolchain for the secure engineering of cyber-physical systems.
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Security Assurance in Cybersecurity
Security by Design reference: JWT/mTLS auth, RBAC, DevSecOps pipeline (SAST/DAST/SBOM/Cosign), Kubernetes hardening. Production-grade patterns.
A comprehensive architectural framework for integrating security into the SDLC. Featuring an interactive 12-step execution model, threat modeling methodologies (STRIDE), and DevSecOps best practices. Security is not a feature; it is the foundation
Find simple open cyber solutions that do work!
A complete, production-grade GitHub repository ecosystem engineered for founders, CISOs, and technical operators who cannot afford to be misread. Thirteen interconnected documents covering legal entity, threat modelling methodology, architecture doctrine, service catalogue, case studies, and engagement protocols .
Secure messaging apps - Now on Codeberg:
Template for a hardened, GDPR-compliant server stack for LexOrbital: Docker + reverse proxy, TLS, secure logging, backups and DRP-ready configuration for production servers.
Educational portfolio project for sanctions and beneficial ownership risk exploration using Django REST, Angular, PostgreSQL, Redis, OpenAPI-first contracts, Security-by-Design controls, and AI governance scaffolding. Not a regulated AML system.
an open source, extensible AI agent that goes beyond code suggestions - install, execute, edit, and test with any LLM
Gestão inteligente de eventos em grupo: automação de votação de datas, cálculo de insumos por participante e divisão de custos. Facilitando o rolê com tecnologia.
Add a description, image, and links to the security-by-design topic page so that developers can more easily learn about it.
To associate your repository with the security-by-design topic, visit your repo's landing page and select "manage topics."