Logo

Selected Pages

    1. Security Frameworks by SEAL
    2. 1. Introduction to the Frameworks
    3. 2. What It Is
    4. 3. What It Isn't
    5. 4. How to Navigate the Website
    6. 5. Overview of Each Framework
    7. Frameworks
    8. 6. Infrastructure
      1. 6.1. Cloud Infrastructure
      2. 6.2. DDoS Protection
      3. 6.3. DNS and Domain Registration
      4. 6.4. Operating System Security
      5. 6.5. Asset Inventory
      6. 6.6. Identity and Access Management
      7. 6.7. Zero-Trust Principles
      8. 6.8. Network Security
    9. 7. Monitoring
      1. 7.1. Guidelines
      2. 7.2. Thresholds
    10. 8. Front-End/Web Application
      1. 8.1. Web Application Security
      2. 8.2. Mobile Application Security
    11. 9. Community Management
      1. 9.1. Discord
      2. 9.2. Twitter
      3. 9.3. Telegram
      4. 9.4. Google
    12. 10. Key Management
      1. 10.1. Custodial vs Non-Custodial
      2. 10.2. Signing Schemes
      3. 10.3. Software Wallets
      4. 10.4. Hardware Wallets
      5. 10.5. Cold vs Hot Wallet
    13. 11. Encryption
      1. 11.1. File Encryption
      2. 11.2. Volume Encryption
      3. 11.3. Full Disk Encryption (FDE)
      4. 11.4. Partition Encryption
      5. 11.5. Cloud Data Encryption
      6. 11.6. Email Encryption
      7. 11.7. Communication Encryption
      8. 11.8. Database Encryption
      9. 11.9. Hardware Encryption
    14. 12. Incident Management
      1. 12.1. SEAL 911 War Room Guidelines
      2. 12.2. Incident Detection and Response Mechanisms
      3. 12.3. Playbooks
      4. 12.4. Communication Strategies
      5. 12.5. Lessons Learned
    15. 13. Operational Security
      1. 13.1. SIM Swapping
      2. 13.2. Telegram
      3. 13.3. Standard Operating Environment
      4. 13.4. Wireless Security
      5. 13.5. Password/Secrets Management
      6. 13.6. Physical Security
      7. 13.7. Detecting and Mitigating Insider Threats
      8. 13.8. G Suite Security
    16. 14. DevSecOps
      1. 14.1. Repository Hardening
      2. 14.2. Code Signing
      3. 14.3. Integrated Development Environments
      4. 14.4. Continuous Integration and Continuous Deployment
    17. 15. Privacy
      1. 15.1. Digital Footprint
      2. 15.2. Secure Browsing
      3. 15.3. Privacy-Focused Operating Systems and Tools
      4. 15.4. Financial Privacy Services
      5. 15.5. Encrypted Communication Tools
      6. 15.6. VPN Services
      7. 15.7. Data Removal Services
    18. 16. Vulnerability Disclosure
      1. 16.1. Security Contact
      2. 16.2. Bug Bounties
    19. 17. Supply Chain
      1. 17.1. Dependency Awareness
      2. 17.2. Supply-Chain Levels for Software Artifacts
    20. 18. Awareness
      1. 18.1. Social Engineering
      2. 18.2. Security Training
      3. 18.3. Staying Up to Date
    21. 19. External Security Reviews
      1. 19.1. Expectation
      2. 19.2. Preparation
      3. 19.3. Vendor Selection
      4. 19.4. Security Policies and Procedures
    22. 20. Governance
      1. 20.1. Risk Management
      2. 20.2. Compliance with Regulatory Requirements
      3. 20.3. Security Metrics and KPIs
    23. 21. Security Automation
      1. 21.1. Threat Detection and Response
      2. 21.2. Infrastructure as Code
      3. 21.3. Compliance Checks
    24. 22. Threat Modeling
      1. 22.1. Identify and Mitigate Threats
      2. 22.2. Create and Maintain Threat Models
    25. 23. Identity and Access Management (IAM)
      1. 23.1. Role-Based Access Control (RBAC)
      2. 23.2. Secure Authentication
    26. 24. Secure Software Development
      1. 24.1. Secure Coding Standards and Guidelines
      2. 24.2. Threat Modeling and Secure Design Principles
      3. 24.3. Code Reviews and Peer Audits
      4. 24.4. Secure Code Repositories and Version Control
    27. 25. Security Testing
      1. 25.1. Dynamic Application Security Testing (DAST)
      2. 25.2. Static Application Security Testing (SAST)
      3. 25.3. Fuzz Testing
      4. 25.4. Security Regression Testing
    28. 26. User and Team Security
      1. 26.1. Security Training
      2. 26.2. Security-Aware Culture
      3. 26.3. Phishing and Social Engineering
    29. Practical Guides
    30. Additional Resources
    31. 27. Contributing
      1. 27.1. Contributors

    Security Frameworks by SEAL

    Contributors