Skip to content

Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create resilient digital systems with efficient responses against to cyber-threats.

License

cybnity/foundation

Repository files navigation

image

Let's Make Safe Digital World!

CYBNITY open source cybersecurity platform help you to govern the cyber defense of your digital assets for operate them with complete serenity.

PURPOSE

Welcome on the CYBNITY open souce program which target to deliver a security platform efficient and flexible for each company with need to design its Information Security Management System (ISMS) and/or to operate digital systems in a secure way against the cyberthreats.

Our Mission

We develop an open source technological defense platform to help the security teams designing and managing companies’ security solutions, create sustainable digital systems with efficient responses against to cyber-threats.

How It Works?

The CYBNITY platform makes it possible to design the strategic governance of the digital assets cybersecurity, and to pilot tactical operational protection systems guaranteeing the neutralization of security incidents.

WHAT CYBERSECURITY PROBLEM THE PROJECT SOLVE?

For any organization with complex areas to defend:

image

Who want to design, implement, manage and keep control of any custom Information Security Management System (ISMS):

companies-design-isms-with-CYBNITY

WHAT WE BUILD?

We develop a technology, deployable as a platform (in-house, on-cloud, in hybrid environment) based on a modular architecture, that support security activities performed by security teams (e.g CISO, ISSO, Risk Executive, RSSI...) with easy implementation of standard (e.g NIST, ISO/IEC 27001, IEC 62443...).

Modular architecture

image

Security activities supported

image

Our Design Approach

Several security domains are covered by our targeted architecture model, implementing a Domain-Driven-Development approach.

Operational Cockpits (User Interfaces)

We capitalize experiences and best defense practices (e.g military or police systems/methods) to build tactical tools integared suite allowing dynamic build according to the deployment context of companies and/or to a risk situation in progress.

image

Applications (domain contexts)

image

THE PROGRAM

Our Methods

BUILD PROCESS

The idea creation process implemented by the project (for definition of more relevant features to develop for enhance the solution), is based on a mix of inspirations coming from proprietary solutions available on the market (maturity level to have), standards and frameworks relevant for the companies (e.g regulation to support), problems and need meet by customers (e.g companies with digital assets, electronic solutions manufacturers) and contextual drivers (e.g countries conflicts increasing cyber-attacks).

image

DELIVERY PROCESS

image

Support & Docs

OTHER RESOURCES

COMMUNICATION CHANNELS

  • Information web site about the project latest news, and documentations about concept, requirements, business/technology/systems architectures...
  • CYBNITY LinkedIn page where project news are promoted to professional ecosystem.

About

Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create resilient digital systems with efficient responses against to cyber-threats.

Topics

Resources

License

Security policy

Stars

Watchers

Forks

Packages

No packages published