DevSecOps for the operations team

Q. What are the suggested open source security monitoring tools corresponding to the 20 CIS Critical Security Controls for Effective Cyber Defense?

Cyber security controls

Examples of security techniques

CSC1: Inventory of Authorized and Unauthorized Devices

Endpoint security, asset management

CSC2: Inventory of Authorized and Unauthorized Software

Endpoint security, asset management

CS3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers.

CIS Security Benchmark, OpenSCAP

CSC4: Continuous Vulnerability Assessment and Remediation

OpenVAS: http://www.openvas.org/

Nmap: https://nmap.org/

OWASP Dependency Check: https://www.owasp.org/index.php/OWASP_Dependency_Check ...

Get Hands-On Security in DevOps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.