Home » Marketplace » Identity Management & Access Control

Identity Management & Access Control

Runtime security monitoring

Verify any security violation at runtime, monitoring stack for the run-time conditions so that the self- learning and self-healing mechanisms can be fed.  

PIACERE Framework

Keywords: cybersecurity, static analysis, model checking, Wazuh, vulnerability assessment 

Benefits: 

  • Able to run integrated vulnerability scanners to scan web applications and detect web vulnerabilities  

Component Security Inspector

Analysing also the IaC code, reports the potential vulnerabilities and proposes potential fixes, addressing the dependency information from the IaC and application code, detect included programs and libraries with known vulnerabilities by querying public vulnerability databases, and produce a report to the PIACERE user.  

PIACERE Framework

Keywords: IaC, component, scanner, vulnerability, reports 

IaC Code Security Inspector

Avoid misconfigurations, insecure coding and configuration patterns through an automated solution for checking the integrity and applicability of IaC code that is to be deployed on an infrastructure. 

PIACERE Framework

Keywords: IaC, code quality, infrastructure, misconfigurations 

Benefits: 

  • Identifies possible vulnerabilities and improvements 

FISHY Security & Privacy Dataspace Infrastructure

An enhanced framework for system events' management, including metrics from different sources and promoting co-relation with added semantics​

FISHY CYBER RESILIENT SUPPLY CHAIN SYSTEM

Easing FISHY platform usability, making the whole system user-friendly and ready to be used for different users according to their expected profile and thus permitted functionalities.

Cyber Security Program for Startups

Worldwide Startups can secure their business with Cyber Legion helps.

Every Startup Organization, regardless of its size, collects, stores, and uses important information, and can struggle to implement powerful cybersecurity practices because of limited resources such as time, money, and people.

Cyber Legion team believe that any Organizations should be help to build and maintain trust and lasting relationships with clients and beneficiaries.

Toolkit for Secure Multi-Party Computation on Ledgers

This toolkit allows  libraries for two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections. The toolkit consists of two parts: 1) the first module generically allows libraries from two/multi-party computation to use a ledger as a communication channel instead of point-to-point connections; 2) the second module is an upgrade of MPyC to add the possibility of verifying computations.

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

SOFIE Privacy and Data Sovereignty Component

Description

The SOFIE Privacy and Data Sovereignty component provides mechanisms that allow actors to better control their data, as well as mechanisms that protect client privacy. 

PDS enables the creation of privacy preserving surveys. These are surveys that allow users to add noise to their responses using local differential privacy mechanisms. The addition of the noise prevents third parties from learning meaningful information about specific users, but at the same time meaningful aggregated statistics can be extracted.

SOFIE Identity, Authentication and Authorisation (IAA) Component

Description

The goal of the SOFIE Identity, Authentication, and Authorisation (IAA) component is to provide mechanisms that can be used for identifying communicating endpoints, as well as for authenticating and authorising users wishing to access a protected resource. 

Pages

News

On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.