Skip to content

TonyPhipps/SIEM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Feb 24, 2025
7833f19 · Feb 24, 2025
Dec 4, 2021
Nov 8, 2020
Mar 6, 2024
Sep 11, 2024
Feb 11, 2025
Aug 28, 2024
Jan 28, 2020
Jan 7, 2025
Feb 24, 2025
Apr 27, 2020
Dec 8, 2019
Oct 22, 2024
May 16, 2024
Jun 7, 2023
Aug 2, 2018
Mar 20, 2023
Nov 16, 2021
Nov 29, 2023
Feb 28, 2024
May 16, 2024
Feb 24, 2025
Oct 16, 2024
Aug 29, 2024
Mar 20, 2023
Apr 3, 2024
Dec 4, 2021
Aug 21, 2024
Oct 17, 2022
Oct 17, 2022
Oct 18, 2024
Dec 27, 2023

Repository files navigation

These resources are intended to guide a SIEM team to...

  • ... develop a workflow for content creation (and retirement) in the SIEM and other security tools.
  • ... illustrate detection coverage provided and highlight coverage gaps as goals to fill.
  • ... eliminate or add additional layers of coverage based on organizational needs.
  • Ensure proper logs are generated and recorded for sufficient detection, investigation, and compliance.

Preparation, Prerequisites, etc.

Without covering the basics, there isn't much point in having a SIEM. Harden your environment and configure appropriate auditing on all endpoints.

Hardening

To detect an attacker, one must be equipped with the necessary logs to reveal their activities. Here we use a matrix to map detection tactics to attacker tactics (Mitre ATT&CK).

Once necessary logs are collected (detection tactics), use various methods to reveal anomalous, suspicious, and malicious activity.

Detection Use Cases

Use Cases provide a means to document solutions for many reasons including tracking work, uniform response, content recreation, metrics & reporting, making informed decisions, avoiding work duplication, and more.

Data Enrichment

These efforts can provide significant benefits to some ingested logs. Typically enrichment will result in either adding a new field to events or a lookup table for use in filtering or filling in a field.

Set up a lab with a Windows system, a SIEM, and an attacking system to aid in detection research and development.

TODO

  • Add Use Case Examples
  • Add Threat Hunts Library
  • Add an object oriented, relational database approach to recording and associating all elements to one another - cases, adversaries, techniques, mitigations, detections, hunts, log sources, etc.