Detection Engineering

repo: infosecB/awesome-detection-engineering
category: Security


Awesome Detection Engineering Awesome

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.

All contributions are welcome, please carefully review the contributing guidelines prior to submitting a pull request.

Contents

Concepts & Frameworks

Detection Content & Signatures

  • Rulehound - An index of publicly available and open-source threat detection rulesets.
  • [MITRE Cyber Analytics Repository (CAR)](https://car.mitre.org) - MITRE's well-maintained repository of detection content.
  • CAR Coverage Comparision - A matrix of MITRE ATT&CK technique IDs and links to available Splunk Security Content, Elastic detection rules, Sigma rules, and CAR content.
  • Sigma Rules - Sigma's repository of turnkey detection content. Content can be converted for use with most SIEMs.
  • Sigma rule converter - An opensource tool that can convert detection content for use with most SIEMs.
  • AttackRuleMap - Mapping of open-source detection rules and atomic tests.
  • [Splunk Security Content](https://github.com/splunk/security_content) - Splunk's open-source and frequently updated detection content that can be tweaked for use in other tools.
  • Elastic Detection Rules - Elastic's detection rules written natively for the Elastic SIEM. Can easily be converted for use by other SIEMs using Uncoder.
  • Elastic Endpoint Behavioral Rules - Elastic's endpoint behavioral (prevention) rules written in EQL, natively for the Elastic endpoint agent.
  • Elastic Yara Signatures - Elastic's YARA signatures, which run on the Elastic endpoint agent.
  • Elastic Endpoint Ransomware Artifact - Elastic's ranswomware artifact, which runs on the Elastic endpoint agent.
  • Chronicle (GCP) Detection Rules - Chronicle's detection rules written natively for the the Chronicle Platform.
  • Exabeam Content Library - Exabeam's out of the box detection content compatible with the Exabeam Common Information Model.
  • Panther Labs Detection Rules - Panther Lab's native detection rules.
  • Anvilogic Detection Armory - Anvilogic's opensource and publicly available detection content.
  • AWS GuardDuty Findings - A list of all AWS GuardDuty Findings, their descriptions, and associated data sources.
  • [GCP Security Command Center Findings](https://cloud.google.com/security-command-center/docs/concepts-security-sources#threats) - A list of all GCP Security Command Center Findings, their descriptions, and associated data sources.
  • [Azure Defender for Cloud Security Alerts](https://docs.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference) - A list of all Azure Security for Cloud Alerts, their descriptions, and associated data sources.
  • [Center for Threat Informed Defense Security Stack Mappings](https://github.com/center-for-threat-informed-defense/security-stack-mappings) - Describes cloud computing platform's (Azure, AWS) built-in detection capabilities and their mapings to the MITRE ATT&CK framework.
  • Detection Engineering with Splunk - A GitHub repo dedicated to sharing detection analytics in SPL.
  • [Google Cloud Security Analytics](https://github.com/GoogleCloudPlatform/security-analytics) - This repository serves as a community-driven list of sample security analytics for auditing cloud usage and for detecting threats to your data & workloads in Google Cloud.
  • [KQL Advanced Hunting Queries & Analytics Rules](https://github.com/Bert-JanP/Hunting-Queries-Detection-Rules) - A list of endpoint detections and hunting queries for Microsoft Defender for Endpoint, Defender For Identity, and Defender For Cloud Apps.
  • Sigma2KQL - A repository of all SIGMA rules converted to KQL that runs on a weekly schedule to update the repository and align with the up to date version of the SIGMA rules repository.
  • TerraSigma - A repository of all SIGMA rules converted to Microsoft Sentinel Terraform Scheduled analytic resources. The repository runs on a weekly schedule to update the repository and align with the up to date version of the SIGMA rules repository. Proper entity mapping is completed for the rules to ensure the repo is plug-and-play.
  • Detections Digest | Sergey Polzunov - A newsletter that features updates from many popular detection content sources listed here.

Logging, Monitoring & Data Sources

General Resources

[[curator]]
I'm the Curator. I can help you navigate, organize, and curate this wiki. What would you like to do?