All Projects → nsacyber → LOCKLEVEL

nsacyber / LOCKLEVEL

Licence: other
A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber

Programming Languages

javascript
184084 projects - #8 most used programming language
powershell
5483 projects
python
139335 projects - #7 most used programming language
C++
36643 projects - #6 most used programming language
HTML
75241 projects
CSS
56736 projects

Projects that are alternatives of or similar to LOCKLEVEL

Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+4554.08%)
Mutual labels:  assessment, compliance
lunasec
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+1186.73%)
Mutual labels:  compliance
currency-exchange
Currency Exchange | powered by Angular 10, TypeScript, ES6+ features, SCSS, JavaScript, PWA
Stars: ✭ 13 (-86.73%)
Mutual labels:  assessment
educhain
an instructional purpose blockchain.
Stars: ✭ 21 (-78.57%)
Mutual labels:  scoring
Linkedin Skill Assessments Quizzes
Full reference of LinkedIn answers 2021 for skill assessments, LinkedIn test, questions and answers (aws-lambda, rest-api, javascript, react, git, html, jquery, mongodb, java, Go, python, machine-learning, power-point) linkedin excel test lösungen, linkedin machine learning test
Stars: ✭ 7,014 (+7057.14%)
Mutual labels:  assessment
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+8110.2%)
Mutual labels:  compliance
pathway
Map your organisation's pathway to open data success
Stars: ✭ 13 (-86.73%)
Mutual labels:  assessment
openacr
OpenACR is a digital native Accessibility Conformance Report (ACR). The initial development is based on Section 508 requirements. The main goal is to be able to compare the accessibility claims of digital products and services. A structured, self-validated, machine-readable documentation will provide for this.
Stars: ✭ 61 (-37.76%)
Mutual labels:  compliance
cis benchmarks audit
Simple command line tool to check for compliance against CIS Benchmarks
Stars: ✭ 182 (+85.71%)
Mutual labels:  compliance
elfeed-score
Gnus-style scoring for elfeed
Stars: ✭ 33 (-66.33%)
Mutual labels:  scoring
spark-ml-serving
Spark ML Lib serving library
Stars: ✭ 49 (-50%)
Mutual labels:  scoring
average-rating
Calculate average score and rating based on Wilson Score Equation
Stars: ✭ 28 (-71.43%)
Mutual labels:  scoring
fedramp-tailored
FedRAMP Tailored.
Stars: ✭ 40 (-59.18%)
Mutual labels:  compliance
travelling-salesman
Rules for Kiwi.com travelling salesman competition
Stars: ✭ 14 (-85.71%)
Mutual labels:  scoring
steampipe-mod-kubernetes-compliance
Run individual controls or full compliance benchmarks for NSA CISA Kubernetes Hardening Guidance across all of your Kubernetes clusters using Steampipe.
Stars: ✭ 23 (-76.53%)
Mutual labels:  compliance
prosoul
Automatic Project Assessment and Visualization based on Quality Models
Stars: ✭ 16 (-83.67%)
Mutual labels:  assessment
AMDock
(Linux and macOS) AMDock: Assisted molecular docking with AutoDock4 and AutoDockVina
Stars: ✭ 27 (-72.45%)
Mutual labels:  scoring
havengrc
☁️Haven GRC - easier governance, risk, and compliance 👨‍⚕️👮‍♀️🦸‍♀️🕵️‍♀️👩‍🔬
Stars: ✭ 83 (-15.31%)
Mutual labels:  compliance
Google-IT-Automation-with-Python-Professional-Certificate
Crash course on python [Course 1 of 6 in the Google IT Automation with Python Specialization
Stars: ✭ 34 (-65.31%)
Mutual labels:  assessment
dep-scan
Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+253.06%)
Mutual labels:  compliance

LOCKLEVEL

LOCKLEVEL was a rapidly built prototype that demonstrates a method for scoring how well Windows systems have implemented some of the NSA Information Assurance top 10 mitigation strategies. This prototype is being shared to encourage industry adoption of these ideas into commercial tools.

LOCKLEVEL was designed as standalone components that can be deployed using existing systems management tools. These independent components leverage Python/PowerShell code for analysis and PowerShell/C/C++ code for system surveys.

Splunk Assessment of Mitigation Implementations (SAMI) is a production version of LOCKLEVEL that implements similar ideas (SAMI does not implement an equivalent of the OSPH component from LOCKLEVEL) and similar business logic. SAMI leverages specific LOCKLEVEL components, such as anti-exploitation (LL_AE) and anti-virus (LL_AV), by using them in the SAMI Technical Addon.

IAD Top 10 Mitigations

LOCKLEVEL implements tests for 7 of the 10 mitigations.

  1. Application Whitelisting - The LL_AW component implements tests for application whitelisting when implemented with Microsoft's Software Restriction Policies or AppLocker.
  2. Control Administrative Privileges - The LL_PtH_And_Credentials component implements tests for auditing high privileged account use across systems.
  3. Limit Workstation to Workstation Communication - The LL_PtH_And_Credentials component implements tests for testing workstation to workstation communication.
  4. Use Anti-Virus File Reputation Services - The LL_AV component implements tests for AV software, including file reputation services, when implemented with McAfee Virus Scan Enterprise.
  5. Enable Anti-Exploitation Features - The LL_AE component implements tests for operating system, hardware, and software anti-exploitation features.
  6. Implement Host Intrusion Prevent System (HIPS) Rules - The LL_HIPS component implements tests for HIPS software checks when implemented with McAfee HIPS.
  7. Set a Secure Baseline Configuration - No tests currently implemented.
  8. Use Web Domain Name System (DNS) Reputation - No tests currently implemented.
  9. Take Advantage of Software Improvements - The LL_OS, LL_AE, and LL_OSPH components implement tests for ensuring modern OSes are used, modern anti-exploitation features are adopted, and timely OS patching is performed.
  10. Segregate Networks and Functions - No tests currently implemented.

Repository Contents

  • GetSystemInfo - Standalone executable that surveys general system information. There is also a PowerShell version.
  • LL_AE - Anti-Exploitation components that includes the analyzer (LL_AE.py) and survey component (AntiExploitation.exe)
  • LL_AV - Antivirus File Reputation components that includes the analyzer (AVFileReputationAnalyzer.py), penalty file generator (GenerateAVFileReputationPenalties.py), and survey component (GetAVStatus.exe).
  • LL_AW - Application Whitelisting components that includes the analyzer (LL_AW_Analyzer.ps1), penalty file generator (New-PenaltyXML.ps1), and survey component (LL_AW_Survey.ps1).
  • LL_HIPS - Host Intrusion Prevention System components that includes the analyzer (LL_HIPS_Analyzer.ps1), penalty file generator (New-PenaltyXML.ps1), and survey component (LL_HIPS_Survey.ps1).
  • LL_OS - Host Operating System components that includes the analyzer (LL_OS_Analyzer.ps1), penalty file generator (New-PenaltyXML.ps1). LL_OS uses GetSystemInfo as the survey component.
  • LL_OSPH - Operating System (Security) Patch Heath components that includes the analyzer (LL_OSPH_Analyzer.ps1), penalty file generator (New-PenaltyXML.ps1), and survey component (LL_OSPH_Survey.ps1).
  • LL_PtH_And_Credentials - LOCKLEVEL Pass the Hash scoring components.
  • presentation - HTML UI for displaying results generated by scoremaster.
  • scoremaster - Component that takes all the results from the analyzers, generates network and host scores, and then creates results used by the presentation component.
  • tools - Miscellaneous tools/utilities.
  • .cmake files - Files for building the project. See BUILD.

License

This Work was prepared by a United States Government employee and, therefore, is excluded from copyright by Section 105 of the Copyright Act of 1976.

Copyright and Related Rights in the Work worldwide are waived through the CC0 1.0 Universal license.

Disclaimer of Warranty

This Work is provided "as is". Any express or implied warranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall the United States Government be liable for any direct, indirect, incidental, special, exemplary or consequential damages (including, but not limited to, procurement of substitute goods or services, loss of use, data or profits, or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this Work, even if advised of the possibility of such damage.

The User of this Work agrees to hold harmless and indemnify the United States Government, its agents and employees from every claim or liability (whether in tort or in contract), including attorneys' fees, court costs, and expenses, arising in direct consequence of Recipient's use of the item, including but not limited to, claims or liabilities made for injury to or death of personnel of User or third parties, damage to or destruction of property of User or third parties, infringement or other violations of intellectual property or technical data rights.

Nothing in this Work is intended to constitute an endorsement, explicit or implied, by the United States Government of any particular manufacturer's product or service.

Disclaimer of Endorsement

Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, in this Work does not constitute an endorsement, recommendation, or favoring by the United States Government and shall not be used for advertising or product endorsement purposes.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].