Awesome Detection
Engineering 
Detection Engineering is a tactical function of a cybersecurity
defense program that involves the design, implementation, and operation
of detective controls with the goal of proactively identifying malicious
or unauthorized activity before it negatively impacts an individual or
an organization.
All contributions are welcome, please carefully review the contributing
guidelines prior to submitting a pull request.
Contents
Concepts & Frameworks
Detection Content &
Signatures
- Rulehound - An index of publicly
available and open-source threat detection rulesets.
- MITRE Cyber Analytics Repository
(CAR) - MITRE’s well-maintained repository of detection
content.
- CAR Coverage
Comparision - A matrix of MITRE ATT&CK technique IDs and links
to available Splunk Security Content, Elastic detection rules, Sigma
rules, and CAR content.
- Sigma Rules - Sigma’s
repository of turnkey detection content. Content can be converted for
use with most SIEMs.
- Sigma rule converter - An
opensource tool that can convert detection content for use with most
SIEMs.
- AttackRuleMap - Mapping of
open-source detection rules and atomic tests.
- Splunk Security
Content - Splunk’s open-source and frequently updated detection
content that can be tweaked for use in other tools.
- Elastic
Detection Rules - Elastic’s detection rules written natively for the
Elastic SIEM. Can easily be converted for use by other SIEMs using
Uncoder.
- Elastic
Endpoint Behavioral Rules - Elastic’s endpoint behavioral
(prevention) rules written in EQL, natively for the Elastic endpoint
agent.
- Elastic
Yara Signatures - Elastic’s YARA signatures, which run on the
Elastic endpoint agent.
- Elastic
Endpoint Ransomware Artifact - Elastic’s ranswomware artifact, which
runs on the Elastic endpoint agent.
- Chronicle
(GCP) Detection Rules - Chronicle’s detection rules written natively
for the the Chronicle Platform.
- Exabeam
Content Library - Exabeam’s out of the box detection content
compatible with the Exabeam Common Information Model.
- Panther
Labs Detection Rules - Panther Lab’s native detection rules.
- Anvilogic
Detection Armory - Anvilogic’s opensource and publicly available
detection content.
- AWS
GuardDuty Findings - A list of all AWS GuardDuty Findings, their
descriptions, and associated data sources.
- GCP
Security Command Center Findings - A list of all GCP Security
Command Center Findings, their descriptions, and associated data
sources.
- Azure
Defender for Cloud Security Alerts - A list of all Azure Security
for Cloud Alerts, their descriptions, and associated data sources.
- Center
for Threat Informed Defense Security Stack Mappings - Describes
cloud computing platform’s (Azure, AWS) built-in detection capabilities
and their mapings to the MITRE ATT&CK framework.
- Detection
Engineering with Splunk - A GitHub repo dedicated to sharing
detection analytics in SPL.
- Google
Cloud Security Analytics - This repository serves as a
community-driven list of sample security analytics for auditing cloud
usage and for detecting threats to your data & workloads in Google
Cloud.
- KQL
Advanced Hunting Queries & Analytics Rules - A list of endpoint
detections and hunting queries for Microsoft Defender for Endpoint,
Defender For Identity, and Defender For Cloud Apps.
- Detections Digest |
Sergey Polzunov - A newsletter that features updates from many
popular detection content sources listed here.
Logging, Monitoring & Data
Sources
General Resources
- ATT&CK
Navigator | MITRE - MITRE’s open-source tool that can be used to
track detection coverage, visibility, and other efforts and their
relationship to the ATT&CK framework.
- Detection Engineering
Weekly | Zack Allen - A newsletter dedicated to news and how-tos for
Detection Engineering.
- Detection
Engineering Twitter List | Zack Allen - A Twitter list of Detection
Engineering thought leaders.
- DETT&CT:
MAPPING YOUR BLUE TEAM TO MITRE ATT&CK™ - Outlines a methodology
measuring security data visibility and detection coverage against the
MITRE ATT&CK framework.
- Awesome
Kubernetes (K8s) Threat Detection - Another Awesome List dedicated
to Kubernetes (K8s) threat detection.
- Detection
and Response Pipeline - A list of tools for each component of a
detection and response pipeline which includes real-world examples.
- Living Off the Living Off the Land
- A collection of resources for thriving off the land.
- Detection
at Scale Podcast | Jack Naglieri - A detection engineering-focused
podcast featuring many thought leaders in the specialization.
- Cloud Threat
Landscape | Wiz - A cloud detection engineering-focused database,
that lists threat actors known to have compromised cloud environments,
the tools and techniques in their arsenal, and the technologies they
prefer to target.
- Splunk
ES Correlation Searches Best Practices | OpsTune - A highly detailed
guide to producing high quality detection content in the Splunk
Enterprise Security app.
- How
Google Does It: Making threat detection high-quality, scalable, and
modern | Anton Chuvakin, Tim Nguyen - The team at Google highlights
5 key principles for building a high quality, scalable and modern threat
detection program.
- SOCLabs - A lab for blue
teamers and detection engineers, with real threat data and support for
popular SIEM query languages, enabling hands-on learning and practice in
detection rule writing and threat hunting.
detectionengineering.md
Github