Detection and Response Pipeline Logo

Detection and Response Pipeline

0
Free
Visit Website

A compilation of suggested tools for each component in a detection and response pipeline, along with real-world examples. The purpose is to create a reference hub for designing effective threat detection and response pipelines. Join us, explore the curated content, and contribute to this collaborative effort. Main Components of a Detection & Response Pipeline: - Detection-as-Code Pipeline - Data Pipeline - Detection and Correlation Engine - Response Orchestration and Automation - Investigation and Case Management - Real-world Examples - Additional Resources Detection-as-Code Pipeline Tool / Service Purpose: - GitHub: Detection content development - GitLab: Detection content development - Gitea: Detection content development - AWS CodeCommit: Detection content development - GitHub Actions: CI/CD pipeline - GitLab Runner: CI/CD pipeline - Drone: CI/CD pipeline - AWS CodePipeline: CI/CD pipeline Resources: Automating Detection-as-Code: An example reference that uses GitHub for detection content development, GitHub Actions for CI/CD, Elastic as SIEM, GitHub Issues for alert management, and Tines for alert and response handling. Practical Detection-as-Code: An exa

FEATURES

ALTERNATIVES

A System for Abuse- and Incident Handling with log file analysis capabilities.

CBRX is a cloud-based platform that automates incident analysis and reporting for cybersecurity teams.

A GraphQL security testing tool

Catalyst is a SOAR system that automates alert handling and incident response processes, adapting to your workflows and being open source.

Repository of default playbooks and custom functions for Splunk SOAR instances with content migration to Splunk's GitHub.

A collection of incident response methodologies for various security incidents, providing easy-to-use operational best practices.

A DFIR console integrating various cybersecurity tools and frameworks for efficient incident response.

A collection of Cyber Incident Response Playbook Battle Cards (PBC) for combating cyber threats and attacks, following a prescriptive approach inspired by CERT Societe Generale's IRM.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved