Skip to content
View andrew-fraley's full-sized avatar

Block or report andrew-fraley

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories Loading

  1. wisp-development-pipeline wisp-development-pipeline Public

    This is a workflow pipeline I created for implementing IRS Written Information Security Plans (WISP) for relevant organizations requiring this for compliance with FTC and IRS standards. It is model…

  2. security-audit-pipeline security-audit-pipeline Public

    This is a basic overview of my security audit workflow, it is designed to showcase my workflow pipeline for running security audits/risk assessments to be paired with developing risk management sys…

  3. system-audit-script system-audit-script Public

    This is a simple script (Windows Powershell or Linux Bash) to run a quick system audit that will give an overview of the system, checking the OS version, current and logged-in users, local user acc…

    PowerShell

  4. kvm-qemu-homelab kvm-qemu-homelab Public

    A practical reference for setting up virtual machine on Linux using KVM, QEMU, and virt-manager. This is useful for simple Linux VMs or Wiindows 10 and prior releases (Windows 11 will be added late…

  5. risk-register risk-register Public

    A realistic information security risk register modeled on NIST Cybersecurity Framework (CSF) 2.0 principles. It covers 20 identified risks across a small professional services organization, documen…

  6. vendor-compliance-audit vendor-compliance-audit Public

    This is a vendor oversight that accompanies IRS Written Information Security Plan development (or other similar compliance based information security plans). It works as a complimentary deliverable…