Created by David French (@threatpunter) at Elastic Security, Dorothy is a tool designed to help security teams test their monitoring and detection capabilities for their Okta environment. It offers modules to simulate attacker actions and security audit actions in an Okta environment, mapped to relevant MITRE ATT&CK® tactics like persistence, defense evasion, and discovery. Elastic Security's free detection rules for Okta can be found in their detection-rules repository. It is recommended to use Dorothy in a test environment to avoid any impact on the production environment.
Common questions about Dorothy including features, pricing, alternatives, and user reviews.
Dorothy is Dorothy is a tool to test monitoring and detection capabilities for Okta environments, with modules mapped to MITRE ATT&CK® tactics. It is a Threat Management solution designed to help security teams with MITRE Attack, Detection Rules.
Dorothy is a free Threat Management tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/elastic/dorothy/ for download and installation instructions.
Popular alternatives to Dorothy include:
Compare these tools and more at https://cybersectools.com/categories/threat-management
Dorothy is for security teams and organizations that need MITRE Attack, Detection Rules. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Threat Management tools can be found at https://cybersectools.com/categories/threat-management
Human-led adversary emulation service testing detection & response capabilities
Validates detective security controls through attack simulations and testing
A framework for executing cloud attacker tactics, techniques, and procedures (TTPs) that can generate APIs, Sigma detection rules, and documentation from YAML-based definitions.
Exposure validation platform combining BAS and attack path validation (CART)