OSCD
Published in

OSCD

OSCD Sprint # 2: Detection, Simulation & Response, results (EN)

Preparation

Beginning

  • Atomic Red Team — small and highly portable detection tests based on MITRE’s ATT&CK. It allows every security team to test their controls by executing simple “atomic tests” that exercise the same techniques used by adversaries. With time, Atomic Red Team tests set has become the biggest and the most mature community-driven Adversary Simulation tests set;
  • TheHive — the most powerful open source and free Security Incident Response Platform. It has a module called Cortex — Observable Analysis and Active Response Engine. It operates by two key entities, called Analyzers and Responders — simple Python scripts that utilize API to communicate with 3rd party systems and execute specific actions.

How it was

Discussion examples

Geography: 🇺🇸 🇷🇺 🇵🇱 🇹🇷 🇦🇺 🇨🇦 🇫🇷 🇮🇳 🇦🇪 🇦🇹 🇧🇷 🇩🇪 🇪🇸 🇳🇱 🇮🇱 🇭🇺 🇸🇬

Results

It is second time we increased Sigma ruleset by more than 30%!

  • Developed 23 and updated 7 Atomic Red Team tests (Pull Request);
  • Developed 24 TheHive responders to automate response actions in Palo Alto NGFW, Duo Security, Gmail and Azure Active Directory (Pull Request);
  • Developed 1 TheHive analyzer for IOC and CVE analysis with Vulners.com (Pull Request).

Participants

Want to be involved

Useful links

--

--

Open international cybersecurity specialist initiative. We collaborate on common problems and share knowledge.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Open Security Collaborative Development

Open international cybersecurity specialist initiative. We collaborate on common problems and share knowledge.