Skip to content

Masriyan/uclsoc_code

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SIEM Use Case Logic

Project Screenshot

Overview

This repository contains comprehensive SIEM (Security Information and Event Management) use case logic, categorized by security domains. Each use case includes pseudocode to detect various security threats, aiding in building an effective security monitoring system.

Directory Structure

SIEM_Use_Cases/
│── 1. Authentication & Identity-Based Use Cases/
│   ├── Authentication & Identity-Based Use Cases.md
│── 2. Endpoint & Malware Detection/
│   ├── Endpoint & Malware Detection.md
│── 3. Network & Perimeter Security Use Cases/
│   ├── Network & Perimeter Security Use Cases.md
│── 4. Cloud Security Monitoring (AWS, GCP, Azure)/
│   ├── Cloud Security Monitoring (AWS, GCP, Azure).md
│── 5. Insider Threat & Data Leakage Prevention/
│   ├── Insider Threat & Data Leakage Prevention.md
│── 6. Threat Intelligence-Driven Use Cases/
│   ├── Threat Intelligence-Driven Use Cases.md
│── 7. Compliance & Regulatory Use Cases/
│   ├── Compliance & Regulatory Use Cases.md
│── 8. OT&ICS (Operational Technology & Industrial Control Systems)/
│   ├── OT&ICS (Operational Technology & Industrial Control Systems).md
│── 9. Application Security & Web Attacks/
│   ├── Application Security & Web Attacks.md
│── 10. Supply Chain & Third-Party Risk/
│   ├── Supply Chain & Third-Party Risk.md
│── Bonus: MITRE ATT&CK-Based Detection Categories/
│   ├── MITRE ATT&CK-Based Detection.md
│── README.md

Purpose

These use cases help security professionals develop effective SIEM detection rules, providing a structured approach to:

  • Detecting cyber threats across different security domains
  • Enhancing security operations and incident response
  • Aligning SIEM rules with frameworks like MITRE ATT&CK

How to Use

Setting Up

  1. Clone the repository:
    git clone https://github.com/your-repo/SIEM-Use-Cases.git
  2. Navigate to the repository:
    cd SIEM-Use-Cases

Implementing Use Cases

  1. Choose the relevant category based on your SIEM needs.
  2. Review the pseudocode and detection logic in the corresponding .md file.
  3. Convert the logic into detection rules for your SIEM platform (Splunk, ELK, Sentinel, QRadar, etc.).
  4. Customize the detection thresholds and parameters to fit your environment.
  5. Test and validate the rules in a controlled environment before deploying them in production.

Continuous Improvement

  • Regularly update the threat detection rules based on new intelligence.
  • Integrate MITRE ATT&CK techniques for enhanced threat mapping.
  • Monitor false positives and false negatives to fine-tune detection logic.
  • Collaborate with the security team to improve detection efficiency.

Contribution

If you'd like to contribute, feel free to submit pull requests or suggest enhancements in the issues section.

License

This project is licensed under the MIT License – feel free to use and modify as needed.


Maintained by:

[sudo3rs] 🚀

About

list of use case library for CSOC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published