Skip to content

Instantly share code, notes, and snippets.

View opexxx's full-sized avatar

Alexander Knorr opexxx

View GitHub Profile
@opexxx
opexxx / Cloud Computing Policy.md
Created September 11, 2024 20:31
Cloud Computing Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
@opexxx
opexxx / Access Control Policy.md
Created September 11, 2024 20:30
Access Control Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
@opexxx
opexxx / Physical Security Policy.md
Created September 11, 2024 20:29
Physical Security Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
@opexxx
opexxx / Access Control Policy.md
Created September 11, 2024 20:25
Access Control Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
@opexxx
opexxx / Configuration Management Policy.md
Created September 11, 2024 20:23
Configuration Management Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
@opexxx
opexxx / Secure Coding Policy.md
Created September 11, 2024 20:21
Secure Coding Policy
Document Type Policy - Mandatory
Document ID
Audience All employees
Confidentiality For internal use
Language English
Applies to
Version
Owner
Author
@opexxx
opexxx / vhd2raw.cmd
Created April 30, 2015 12:45 — forked from mwchambers/gist:1319382
convert VHD file to RAW Image
qemu-img convert -O raw source.vhd output.raw
@opexxx
opexxx / gc_infosec.sh
Last active November 18, 2023 16:49
gitClone_infosecTools
git clone --recursive https://github.com/screetsec/Sudomy.git
git clone https://bitbucket.org/LaNMaSteR53/recon-ng.git
git clone https://github.com/0ang3el/aem-hacker.git
git clone https://github.com/0xinfection/tidos-framework.git
git clone https://github.com/1N3/BlackWidow.git
git clone https://github.com/1N3/Goohak.git
git clone https://github.com/1N3/IntruderPayloads
git clone https://github.com/1N3/Sn1per.git
git clone https://github.com/Alfresco/prowler.git
git clone https://github.com/Arr0way/linux-local-enumeration-script.git
@opexxx
opexxx / risk checklist
Created August 23, 2023 20:16
risk checklist
1 Has the board and executive expressed their support for a risk management programme?
2 Has the risk committee (or equivalent) and the board reviewed and approved the risk policy/ strategy?
3 Have you identified a person who will be responsible for implementing risk management?
4 Does the risk manager, or equivalent, have reasonable access to staff and management across the organisation?
5 Have you defined categories of risk relevant to your organisation and industry?
6 Do your risk categories reflect all operational risk areas of the business as well as more strategic risk categories?
7 Is there a clear organisational strategy (or objectives) articulated for the organisation?
8 Have you defined and agreed a likelihood scale to assess the potential for the risk to occur throughout the organisation?
9 Have you defined and agreed a consequence scale to help assess risk impacts across the organisation?
10 Does the organisation's consequence scale describe both financial and non-financial impacts?
@opexxx
opexxx / CISSP
Created August 10, 2023 19:27
CISSP Topics
Access Control
Is Collection of mechanism that permits managers of system to exercise a directing or restraining influence over the behavior ,use and content of a system.
Access Control Concepts
Access Control Principles
Information Classifi cation
Access Control Requirements
Access Control Categories
Access Control Types
Access Control Strategies
Identity Management