A collection of Cyber Incident Response Playbook Battle Cards (PBC) that provide structured recipes for preparing and applying countermeasures against cyber threats and attacks. The battle cards follow a prescriptive approach to combat various tactics, techniques, and procedures (TTP) deployed by cyber threat actors. They are designed to aid kinetic activities conducted by humans before, during, and after cybersecurity incident response operations. The playbook cards are inspired by CERT Societe Generale's Incident Response Methodology (IRM) and serve as practical reference materials for incident response teams. Each card contains actionable guidance and procedures that can be implemented during security incidents. The resource includes references to established frameworks and publications including NIST Cybersecurity Framework, NIST Special Publications 800-184 and 800-61 Rev. 2, and MITRE Cyber Exercise Playbook. This alignment ensures the battle cards follow industry-standard incident response practices and methodologies.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Automatically configure your app to follow OWASP security patterns and principles with Nuxt Security module.
Exabeam Security Operations Platform is a cloud-native security platform that applies AI and automation to security operations workflows for threat detection, investigation, and response.
Request Tracker for Incident Response (RTIR) is a tool for incident response teams to manage incident reports, correlate data, and facilitate communication.
Automated tool for scripting complex sequences in cybersecurity frameworks.
Scumblr is a web application for periodic syncs of data sources and security analysis to streamline proactive security.
TheHive is a case management platform for security operations teams that facilitates incident response, threat analysis, and team collaboration.
Templates for incident response run-books tailored for AWS environments based on NIST guidelines.
A comprehensive auditd configuration for Linux systems following best practices.
Open source application to instantly remediate common security issues through the use of AWS Config.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.