Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-detection-engineering
Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.
https://github.com/infosecB/awesome-detection-engineering
Last synced: about 22 hours ago
JSON representation
-
Concepts & Frameworks
- Alerting and Detection Strategies (ADS) Framework | Palantir - A blueprint for creating and documenting effective detection content.
- Synthetic Adversarial Log Objects (SALO) | Splunk - Synthetic Adversarial Log Objects (SALO) is a framework for the generation of log events without the need for infrastructure or actions to initiate the event that causes a log event.
- Prioritizing Detection Engineering | Ryan McGeehan - A longtime detection engineer outlines how a detection engineering program should be built from the ground up.
- Elastic's Detection Engineering Behavior Maturity Model - Elastic's qualitative and quantitative approach to measuring threat detection program maturity.
- Blue-team-as-Code - the Spiral of Joy | Den Iuzvyk, Oleg Kolesnikov - Blue-Team-as-Code: Lessons From Real-world Red Team Detection Automation Using Logs.
- MaGMa (Management, Growth and Metrics & Assessment) Use Case Defintion Model - A business-centric approach for defining threat detection use cases.
- The Zen of Security Rules | Justin Ibarra - Outlines 19 aphorisms that serve as universal principles for the creation of high quality detection content.
- MITRE ATT&CK - The foundational framework of adversary tactics, techniques, and procedures based on real-world observations.
- Detection Engineering Maturity Matrix | Kyle Bailey - A detailed matrix that serves as a tool to measure the overall maturity of an organization's Detection Engineering program.
- Detection Maturity Level (DML) Model | Ryan Stillions - Defines and describes 8 different levels of an organization's threat detection program maturity.
- The Pyramid of Pain | David J Bianco - A model used to describe various categorizations of indicator's of compromise and their level of effectiveness in detecting threat actors.
- Detection Development Lifecycle | Haider Dost et al. - Snowflake’s implementation of the Detection Development Lifecycle.
- Threat Detection Maturity Framework | Haider Dost of Snowflake - A maturity matrix to measure the success of your threat detection program.
- Cyber Kill Chain | Lockheed Martin - Lockheed Martin's framework that outlines the 7 stages commonly observed in a cyber attack.
-
Detection Content & Signatures
- Splunk Security Content - Splunk's open-source and frequently updated detection content that can be tweaked for use in other tools.
- Chronicle (GCP) Detection Rules - Chronicle's detection rules written natively for the the Chronicle Platform.
- Exabeam Content Library - Exabeam's out of the box detection content compatible with the Exabeam Common Information Model.
- Anvilogic Detection Armory - Anvilogic's opensource and publicly available detection content.
- Center for Threat Informed Defense Security Stack Mappings - Describes cloud computing platform's (Azure, AWS) built-in detection capabilities and their mapings to the MITRE ATT&CK framework.
- Detection Engineering with Splunk - A GitHub repo dedicated to sharing detection analytics in SPL.
- Google Cloud Security Analytics - This repository serves as a community-driven list of sample security analytics for auditing cloud usage and for detecting threats to your data & workloads in Google Cloud.
- KQL Advanced Hunting Queries & Analytics Rules - A list of endpoint detections and hunting queries for Microsoft Defender for Endpoint, Defender For Identity, and Defender For Cloud Apps.
- MITRE Cyber Analytics Repository (CAR) - MITRE's well-maintained repository of detection content.
- CAR Coverage Comparision - A matrix of MITRE ATT&CK technique IDs and links to available Splunk Security Content, Elastic detection rules, Sigma rules, and CAR content.
- Sigma rule converter - An opensource tool that can convert detection content for use with most SIEMs.
- Elastic Detection Rules - Elastic's detection rules written natively for the Elastic SIEM. Can easily be converted for use by other SIEMs using Uncoder.
- Elastic Endpoint Behavioral Rules - Elastic's endpoint behavioral (prevention) rules written in EQL, natively for the Elastic endpoint agent.
- Elastic Yara Signatures - Elastic's YARA signatures, which run on the Elastic endpoint agent.
- Elastic Endpoint Ransomware Artifact - Elastic's ranswomware artifact, which runs on the Elastic endpoint agent.
- Panther Labs Detection Rules - Panther Lab's native detection rules.
- AWS GuardDuty Findings - A list of all AWS GuardDuty Findings, their descriptions, and associated data sources.
- GCP Security Command Center Findings - A list of all GCP Security Command Center Findings, their descriptions, and associated data sources.
-
Logging, Monitoring & Data Sources
- Exabeam Common Information Model - Exabeam's proprietary model used as a framework for normalizing security data.
- Loghub - Opensource and freely available security data sources for research and testing.
- Elastalert | Yelp - ElastAlert is a simple framework for alerting on anomalies, spikes, or other patterns of interest from data in Elasticsearch.
- Matano - Open source cloud-native security lake platform (SIEM alternative) for threat hunting, Python detections-as-code, and incident response on AWS 🦀.
- Microsoft XDR Advanced Hunting Schema - table queries, you can use the advanced hunting schema, which includes tables and columns with event information and details about devices, alerts, identities, and other entity types.
- Windows Logging Cheatsheets - Multiple cheatsheets outlined recommendations for Windows Event logging at various levels of granularity.
- Linux auditd Detection Ruleset - Linux auditd ruleset that produces telemetry required for threat detection use cases.
- MITRE ATT&CK Data Sources Blog Post - MITRE describes various data sources and how they relate to the TTPs found in the MITRE ATT&CK framework.
- MITRE ATT&CK Data Sources List - Data source objects added to MITRE ATT&CK as part of v10.
- Splunk Common Information Model (CIM) - Splunk's proprietary model used as a framework for normalizing security data.
- Elastic Common Schema - Elastic's proprietary model used as a framework for normalizing security data.
- Open Cybersecurity Schema Framework (OCSF) - An opensource security data source and event schema.
-
General Resources
- Awesome Kubernetes (K8s) Threat Detection - Another Awesome List dedicated to Kubernetes (K8s) threat detection.
- Detection and Response Pipeline - A list of tools for each component of a detection and response pipeline which includes real-world examples.
- ATT&CK Navigator | MITRE - MITRE's open-source tool that can be used to track detection coverage, visibility, and other efforts and their relationship to the ATT&CK framework.
- Detection Engineering Twitter List | Zack Allen - A Twitter list of Detection Engineering thought leaders.
- Living Off the Living Off the Land - A collection of resources for thriving off the land.
- Detection at Scale Podcast | Jack Naglieri - A detection engineering-focused podcast featuring many thought leaders in the specialization.
- Cloud Threat Landscape | Wiz - A cloud detection engineering-focused database, that lists threat actors known to have compromised cloud environments, the tools and techniques in their arsenal, and the technologies they prefer to target.
- Splunk ES Correlation Searches Best Practices | OpsTune - A highly detailed guide to producing high quality detection content in the Splunk Enterprise Security app.
- DETT&CT: MAPPING YOUR BLUE TEAM TO MITRE ATT&CK™ - Outlines a methodology measuring security data visibility and detection coverage against the MITRE ATT&CK framework.
Categories
Sub Categories
Keywords
security
4
detection-engineering
4
cybersecurity
3
detection
3
splunk
3
threat-hunting
3
dfir
2
mitre-attack
2
gcp
2
cloud
2
azure
2
aws
2
log-analytics
2
bigquery
1
chronicle
1
cloud-security-command-center
1
google-cloud
1
audit-logs
1
vulnerability
1
text4shell
1
rtm-locker
1
line-runner
1
line-dancer
1
esxi-ransomware
1
esxi-malware
1
cve-2024-20359
1
cve-2024-20353
1
bpfdoor-detection
1
bpfdoor
1
arcanedoor
1
snowflake
1
responses
1
engineering
1
cicd
1
octo-correct-managed
1
log-analysis
1
log-intelligence
1
log-parsing
1
logs
1
unstructured-logs
1
alerting
1
apache-iceberg
1
aws-security
1
big-data
1
cloud-native
1
cloud-security
1
log-management
1
rust
1
secops
1
security-tools
1