-
Notifications
You must be signed in to change notification settings - Fork 104
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create Detection-Library-Structure.md
- Loading branch information
1 parent
0226c9b
commit 6b1f5c4
Showing
1 changed file
with
104 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,104 @@ | ||
- [Executive Summary](#executive-summary) | ||
- [Name](#name) | ||
- [Problem Statement](#problem-statement) | ||
- [Objectives](#objectives) | ||
- [Compliance](#compliance) | ||
- [MITRE ATT&CK Framework](#mitre-attck-framework) | ||
- [Assumptions and Limitations](#assumptions-and-limitations) | ||
- [Analysis](#analysis) | ||
- [Monitoring and Notifications](#monitoring-and-notifications) | ||
- [Recommended Response Action(s)](#recommended-response-actions) | ||
- [Engineering](#engineering) | ||
- [Component Names](#component-names) | ||
- [Alert [Name]](#alert-name) | ||
- [Query [Name]](#query-name) | ||
- [Data Stream Analysis](#data-stream-analysis) | ||
- [Validation](#validation) | ||
- [Attack Simulation](#attack-simulation) | ||
- [References and Resources](#references-and-resources) | ||
|
||
|
||
# Executive Summary | ||
|
||
Primarily focused on providing high-level information, references, and background. | ||
|
||
|
||
## Name | ||
|
||
A succinct statement that describes the detection (e.g. Detect Communication with a Known-Bad IP). | ||
|
||
|
||
## Compliance | ||
|
||
List applicable compliance frameworks and specific components this Detection relates to. | ||
|
||
|
||
## MITRE ATT&CK Framework | ||
|
||
List applicable MITRE ATT&CK Framework Tactics/Techniques this Detection relates to. | ||
|
||
## Assumptions and Limitations | ||
|
||
Describes any assumptions/limitations regarding law, licensing, policies, or technicalities. | ||
|
||
|
||
# Analysis | ||
|
||
Insight on the actions of and tools for those who are expected to monitor and respond. | ||
|
||
|
||
## Monitoring and Notifications | ||
|
||
Describes how the detection will bring attention to itself. This typically involves monitors, dashboards, reports, emails, alerts, etc. | ||
|
||
|
||
## Recommended Use Case / Playbook(s) | ||
|
||
Describes which one or more playbooks should be followed in handling the detection. | ||
|
||
|
||
# Engineering | ||
|
||
The necessary steps and content construction that fulfills the Detection. If the Detection and all its components were lost, this section should allow complete reconstruction. | ||
|
||
|
||
## Component Names | ||
|
||
The base components that provide business logic, display, and notification. | ||
- Include the expected source log makeup and example. | ||
- Use a word like "Suspicious" to indicate that the fidelity is lower, therefore some false positives may result. | ||
- Group alerts/queries into a single use case when they share common objectives/recommended response actions. | ||
|
||
|
||
### Alert [Name] | ||
|
||
- Filter | ||
- Grouping | ||
- Severity | ||
- Threshold | ||
- Event Count | ||
- Time Window | ||
- Category/Normalization | ||
- Tags | ||
- Fidelity (high means no false positives) | ||
|
||
|
||
### Query [Name] | ||
|
||
- Query String | ||
- Fidelity (high means no false positives) | ||
- Query Explanation | ||
|
||
|
||
## Validation | ||
|
||
Methods to ensure the Detection was developed and is operating properly. These can be pass/fail, time based, or other relevant measurements. When possible, include an automated script or manual steps to cause the alert to fire on demand (i.e. attack simulation). | ||
|
||
|
||
### Attack Simulation | ||
|
||
Specific actions to reproduce events that are expected to be detected/highlighted by use case components. | ||
|
||
|
||
## References and Resources | ||
Any useful resources or references that can help understand the vulnerability, attack, detection logic, affected software, protocols, etc. |