Skip to content

infosecB/awesome-detection-engineering

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

141 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Awesome Detection Engineering Awesome

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.

All contributions are welcome, please carefully review the contributing guidelines prior to submitting a pull request.

Contents

Concepts & Frameworks

Detection Content & Signatures

Logging, Monitoring & Data Sources

  • Windows Logging Cheatsheets - Multiple cheatsheets outlined recommendations for Windows Event logging at various levels of granularity.
  • Linux auditd Detection Ruleset - Linux auditd ruleset that produces telemetry required for threat detection use cases.
  • MITRE ATT&CK Data Sources Blog Post - MITRE describes various data sources and how they relate to the TTPs found in the MITRE ATT&CK framework.
  • MITRE ATT&CK Data Sources List - Data source objects added to MITRE ATT&CK as part of v10.
  • Splunk Common Information Model (CIM) - Splunk's proprietary model used as a framework for normalizing security data.
  • Elastic Common Schema - Elastic's proprietary model used as a framework for normalizing security data.
  • Exabeam Common Information Model - Exabeam's proprietary model used as a framework for normalizing security data.
  • Open Cybersecurity Schema Framework (OCSF) - An opensource security data source and event schema.
  • Loghub - Opensource and freely available security data sources for research and testing.
  • Elastalert | Yelp - ElastAlert is a simple framework for alerting on anomalies, spikes, or other patterns of interest from data in Elasticsearch.
  • Matano - Open source cloud-native security lake platform (SIEM alternative) for threat hunting, Python detections-as-code, and incident response on AWS 🦀.
  • Microsoft XDR Advanced Hunting Schema To help with multi-table queries, you can use the advanced hunting schema, which includes tables and columns with event information and details about devices, alerts, identities, and other entity types.
  • InnerWarden - Autonomous security agent for Linux with real-time threat detection and response via 38 eBPF hooks, 48 detectors, and 23 correlation rules.

General Resources

About

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.

Topics

Resources

License

Code of conduct

Contributing

Stars

Watchers

Forks

Contributors