11/12 free views
Tool
GUI
Governance, Risk, and Compliance (GRC)

cset

by cisagov

1.7Kstars
301forks
72watchers
Updated 5 months ago
About

CSET is a free software tool that guides organizations through cybersecurity risk assessments and compliance auditing to improve their critical infrastructure security posture.

Cybersecurity Evaluation Tool

Primary Use Case

CSET is primarily used by asset owners and cybersecurity professionals to evaluate vulnerabilities in industrial control systems and IT architectures by comparing facility-specific data against established cybersecurity standards. It facilitates risk assessment, compliance auditing, and provides actionable recommendations to enhance cybersecurity controls within critical infrastructure environments.

Key Features
  • Step-by-step guided process to collect facility-specific cybersecurity information
  • Assessment of compliance against multiple cybersecurity standards and regulations
  • Provides actionable recommendations linked to cybersecurity best practices
  • Supports analysis of both industrial control systems (ICS) and IT architectures
  • Documentation and reporting of identified cybersecurity vulnerabilities
  • Available as standalone Windows application or client-server architecture
  • Supports local installation and Docker-based deployment for Mac/Linux users
  • Includes frameworks for risk assessment, compliance auditing, and security automation

Installation

  • For Windows: Download local installers or enterprise binaries from the CSET Releases page
  • Ensure system meets minimum requirements: Pentium dual core 2.2 GHz, 6 GB free disk space, 4 GB RAM, Windows 10 or higher
  • Microsoft .NET 7 Runtime, ASP.NET Core 7 Runtime, and SQL Server 2022 LocalDB are included in the installation
  • For Mac/Linux: Clone the repository
  • Install Docker Desktop and allocate at least 10 GB of memory in Docker settings
  • Copy environment variables: cp env.dist .env
  • Run CSET using Docker Compose: docker compose up -d
  • Load the database as per included make commands or instructions

Usage

>_ docker compose up -d

Starts the CSET application in detached mode using Docker Compose for Mac/Linux users

>_ cp env.dist .env

Copies the environment variable template to a working .env file for Docker configuration

Security Frameworks
Reconnaissance
Resource Development
Initial Access
Discovery
Impact
Usage Insights
  • Integrate CSET outputs with SIEM platforms to automate compliance monitoring and vulnerability tracking.
  • Use CSET's guided assessments to tailor purple team exercises focusing on compliance gaps and risk areas.
  • Leverage CSET's multi-framework support to harmonize security controls across ICS and IT environments.
  • Deploy CSET in continuous risk assessment workflows to proactively identify and remediate emerging vulnerabilities.
  • Combine CSET reports with threat intelligence feeds to prioritize mitigation efforts based on current adversary tactics.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about cset. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team30%
Blue Team90%
Purple Team70%
Details
LicenseMIT License
LanguageTSQL
Open Issues175
Topics
cset
security-audit