Cyber Incident Response Playbook Battle Cards Logo

Cyber Incident Response Playbook Battle Cards

0
Free
Visit Website

A collection of Cyber Incident Response Playbook Battle Cards (PBC) which are recipes for preparing and applying countermeasures against cyber threats and attacks. PBC follow a prescriptive approach to combat various TTP deployed by cyber threat actors, aiding the kinetic activities conducted by humans prior to, during, and after cybersecurity incident response. Inspired by CERT Societe Generale's IRM, these cards are valuable resources for incident response teams. For more information, visit: - CERT Societe Generale's IRM: https://github.com/certsocietegenerale/IRM/ - GuardSight's Cybersecurity Incident Response Plan: https://github.com/guardsight/gsvsoc_cybersecurity-incident-response-plan - Incident Response Playbooks: https://www.incidentresponse.com/playbooks/ - NIST Cybersecurity Framework: https://www.nist.gov/cyberframework - NIST Special Publication 800-184: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-184.pdf - NIST Special Publication 800-61 Rev. 2: https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final - MITRE Cyber Exercise Playbook: https://www.mitre.org/sites/default/files/publications/pr_14-3929-cyber-exercise-playbook.pdf

FEATURES

ALTERNATIVES

Enhances Windows OS security through system modifications and settings adjustments.

A report on detecting lateral movement through tracking event logs, updated to include analysis of various tools and commands used by attackers.

A public incident response process documentation used at PagerDuty

Repository of templates for Ayehu's workflows with the ability to design, execute, and automate IT and business processes.

Collection of scripts and resources for DevSecOps, Security Automation and Automated Incident Response Remediation.

A DevSecOps command line asset inventory tool

Detailed analysis of the event-stream incident and actions taken by npm Security.

An automation platform with community support and documentation for easy development.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved