Skip to content

Commit

Permalink
Create Detection-Library-Structure.md
Browse files Browse the repository at this point in the history
  • Loading branch information
TonyPhipps authored Oct 22, 2024
1 parent 0226c9b commit 6b1f5c4
Showing 1 changed file with 104 additions and 0 deletions.
104 changes: 104 additions & 0 deletions Detection-Library-Structure.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,104 @@
- [Executive Summary](#executive-summary)
- [Name](#name)
- [Problem Statement](#problem-statement)
- [Objectives](#objectives)
- [Compliance](#compliance)
- [MITRE ATT&CK Framework](#mitre-attck-framework)
- [Assumptions and Limitations](#assumptions-and-limitations)
- [Analysis](#analysis)
- [Monitoring and Notifications](#monitoring-and-notifications)
- [Recommended Response Action(s)](#recommended-response-actions)
- [Engineering](#engineering)
- [Component Names](#component-names)
- [Alert [Name]](#alert-name)
- [Query [Name]](#query-name)
- [Data Stream Analysis](#data-stream-analysis)
- [Validation](#validation)
- [Attack Simulation](#attack-simulation)
- [References and Resources](#references-and-resources)


# Executive Summary

Primarily focused on providing high-level information, references, and background.


## Name

A succinct statement that describes the detection (e.g. Detect Communication with a Known-Bad IP).


## Compliance

List applicable compliance frameworks and specific components this Detection relates to.


## MITRE ATT&CK Framework

List applicable MITRE ATT&CK Framework Tactics/Techniques this Detection relates to.

## Assumptions and Limitations

Describes any assumptions/limitations regarding law, licensing, policies, or technicalities.


# Analysis

Insight on the actions of and tools for those who are expected to monitor and respond.


## Monitoring and Notifications

Describes how the detection will bring attention to itself. This typically involves monitors, dashboards, reports, emails, alerts, etc.


## Recommended Use Case / Playbook(s)

Describes which one or more playbooks should be followed in handling the detection.


# Engineering

The necessary steps and content construction that fulfills the Detection. If the Detection and all its components were lost, this section should allow complete reconstruction.


## Component Names

The base components that provide business logic, display, and notification.
- Include the expected source log makeup and example.
- Use a word like "Suspicious" to indicate that the fidelity is lower, therefore some false positives may result.
- Group alerts/queries into a single use case when they share common objectives/recommended response actions.


### Alert [Name]

- Filter
- Grouping
- Severity
- Threshold
- Event Count
- Time Window
- Category/Normalization
- Tags
- Fidelity (high means no false positives)


### Query [Name]

- Query String
- Fidelity (high means no false positives)
- Query Explanation


## Validation

Methods to ensure the Detection was developed and is operating properly. These can be pass/fail, time based, or other relevant measurements. When possible, include an automated script or manual steps to cause the alert to fire on demand (i.e. attack simulation).


### Attack Simulation

Specific actions to reproduce events that are expected to be detected/highlighted by use case components.


## References and Resources
Any useful resources or references that can help understand the vulnerability, attack, detection logic, affected software, protocols, etc.

0 comments on commit 6b1f5c4

Please sign in to comment.