{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"foundation","owner":"cybnity","isFork":false,"description":"Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create resilient digital systems with efficient responses against to cyber-threats.","allTopics":["java","platform","nist","cybersecurity","software","cyber-security","governance","isms","iso27001"],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":116,"starsCount":12,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T16:14:35.487Z"}},{"type":"Public","name":"iac-helm-charts","owner":"cybnity","isFork":false,"description":"Helm charts project supporting the configuration management (repeatable application installation) of CYBNITY systems and their provisioning management (K8S resources: networking, load balancing, db, users, permissions...) as Infrastructure-As-Code (IaC) automating installation on multiples Kubernetes clusters (orchestration managed environments).","allTopics":[],"primaryLanguage":{"name":"Mustache","color":"#724b3b"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T15:19:05.349Z"}},{"type":"Public","name":"foundation-techstack","owner":"cybnity","isFork":false,"description":"Catalog of technologies selected by CYBNITY as referential frameworks and technologies versions authorized for CYBNITY systems development","allTopics":["java","framework","maven","reactjs","vertx"],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T15:18:41.313Z"}},{"type":"Public","name":"domain-risk-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Risk Management bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","risk-management"],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T15:17:52.480Z"}},{"type":"Public","name":"domain-access-control","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Access Control bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","access-control"],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T15:16:48.791Z"}},{"type":"Public","name":"domain-api-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the API Management bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","api-management","cybersecurity","software"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-16T16:42:29.899Z"}},{"type":"Public template","name":"domain-vulnerability-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Vulnerability bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","vulnerability-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:19:24.075Z"}},{"type":"Public","name":"domain-trial-training-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the security exercises bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","trial-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:19:15.356Z"}},{"type":"Public","name":"domain-threat-intelligence","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Threat Intelligence bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","threat-intelligence","threat-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:19:06.766Z"}},{"type":"Public","name":"domain-security-event-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Security Event Management bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","event-management","cybersecurity","software","security-events"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:18:57.657Z"}},{"type":"Public","name":"domain-response-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Response bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","response-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:18:40.123Z"}},{"type":"Public","name":"domain-quality-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Quality bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","quality-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:18:31.596Z"}},{"type":"Public","name":"domain-posture-prevention-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Posture & Prevention bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","posture-management","prevention-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:18:22.545Z"}},{"type":"Public","name":"domain-governance-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the cybersecurity Governance bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","nist","cybersecurity","software","iso27001","governance-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:18:13.642Z"}},{"type":"Public","name":"domain-detection-intelligence","owner":"cybnity","isFork":false,"description":"All the features and services realized by the security Detection Intelligence bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","detection-intelligence"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:18:04.725Z"}},{"type":"Public","name":"domain-compliance-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Compliance and Certification bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","compliance-management","certification-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:17:54.385Z"}},{"type":"Public","name":"domain-behavior-intelligence","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Behavior Intelligence bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","behavior-intelligence"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:17:45.713Z"}},{"type":"Public","name":"domain-awareness-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Awareness & Culture bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","security-awareness","security-culture"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:17:36.203Z"}},{"type":"Public","name":"domain-audit-mgt","owner":"cybnity","isFork":false,"description":"All the features and services realized by the security Audit bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","security-audit","cybersecurity","software","audit-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:17:27.317Z"}},{"type":"Public","name":"domain-asset-control","owner":"cybnity","isFork":false,"description":"All the features and services realized by the Asset Control bounded context relative to the application domain, including specification library (e.g api), components implementation (e.g software implementation packages) and deployable systems (e.g operable component on infrastructure types).","allTopics":["java","cybersecurity","software","asset-management","asset-control"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-31T15:17:17.070Z"}},{"type":"Public","name":".github","owner":"cybnity","isFork":false,"description":"Presentation of the CYBNITY organization profile","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-31T11:17:13.292Z"}},{"type":"Public template","name":"mpp-demonstrators","owner":"cybnity","isFork":false,"description":"Dedicated to the build and delivery of demonstration models (e.g technology POC, UI demonstrator) allowing to make ideas validation and to take decision about opportunity of technologies use.","allTopics":["ui","ux","cybersecurity","software"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":32,"starsCount":1,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-31T08:48:10.635Z"}}],"repositoryCount":22,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}