Security Operations Chef
The idea here is try see if there is some way to bridge the gap between:
Reactive Orgs that either do not have Policies, Processes and Procedures or ones that have documents but that are shelfware or not relevent or followed when it comes to task.
(these should be treated as proof of concepts/experiments, you might find them useful, you might find bugs/issues - feel free to log issues)
🗒️ Cyber Security Policy Generation Tool - High Level
💻 Device Security Policy Generation Tool - High Level
🗒️ Cyber Security Roadmap & Budget Planner
🏥 Generic Cyber Incident Response Plan
🗒️ Data Breach Business Response Wizard
🗒️ Business Email Compromise (BEC) Response Plan
📧 Third Party - Business Email Compromise (BEC) Reporting Process
📧 Business Email Compromise - Third Party Phish followed by breach
📧 Compromised Mailbox Analysis Investigation
🗒️ Incident Timeline Creation Tool
🗒️ Incident Response Status Report Tool
🗒️ Incident Response Contact Tool
🗒️ Incident Response Overview UK General Business
🗒️ Incident Response Overview UK Charrities
🗒️ Data Breach Preparedness Assessment Tool
🗒️ Supplier Breach Report Request Form
🧑🤝🧑 Joiners, Movers, Leavers (JML)
🇬🇧 CAF Planning Assessment - very experimental
🇬🇧 CAF 3.2 Assessment PoC- very experimental
🎨 Kill Chain Analysis - MITRE ATT&CK
⚡️ Incident Response Planning - Network Isolation Scnenario Examples
⚡️ Attacking a Network - Attack Tree Example HMTL/JS
🎨 MSP Harms and Countermeasures
🎨 Office 365 Audit Log to Timline Visualisation
🎨 Office 365 Audit Log to Timline Visualisation V2
🎨 Defender Identities CSV Visualisation
🎨 Exernal - MSP Backup Services Assessment
🎨 AES String Encrtption and Decryption Tool
🗒️ Days Ago
Copyright (c) Xservus Limited Created by mRr3b00t
Version 0.25 - Experimental - Use at own risk