Detection and Response Pipeline Logo

Detection and Response Pipeline

0
Free
Visit Website

A compilation of suggested tools for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. Join us, explore the curated content, and contribute to this collaborative effort. Main Components of a Detection & Response Pipeline: - Detection-as-Code Pipeline - Data Pipeline - Detection and Correlation Engine - Response Orchestration and Automation - Investigation and Case Management - Real-world Examples - Additional Resources Detection-as-Code Pipeline Tool / Service Purpose: - GitHub: Detection content development - GitLab: Detection content development - Gitea: Detection content development - AWS CodeCommit: Detection content development - GitHub Actions: CI/CD pipeline - GitLab Runner: CI/CD pipeline - Drone: CI/CD pipeline - AWS CodePipeline: CI/CD pipeline Resources: Automating Detection-as-Code: An example reference that uses GitHub for detection content development, GitHub Actions for CI/CD, Elastic as SIEM, GitHub Issues for alert management, and Tines for alert and response handling. Practical Detection-as-Code: An exa

FEATURES

ALTERNATIVES

Open source application to instantly remediate common security issues through the use of AWS Config.

Scumblr is a web application for periodic syncs of data sources and security analysis to streamline proactive security.

A project that uses Athena and EventBridge to investigate API activity and notify of actions for incident response and misconfiguration detection.

Receive important notifications and updates related to North American electric grid security.

A Sysmon configuration repository for customizing Microsoft Sysinternals Sysmon configurations with modular setup.

Web-based tool for incident response with easy local installation using Docker.

Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.

Stronghold is the easiest way to securely configure your Mac.