Upload files to "Modules/Knowledge/SOC"

This commit is contained in:
2024-11-30 00:52:43 -05:00
parent c48c705ef2
commit 74c0aaafcf
5 changed files with 156 additions and 0 deletions

View File

@ -0,0 +1,29 @@
def get_content():
"""
Returns structured content focusing on cybersecurity as a business decision.
"""
return [
{
"title": "Cybersecurity as a Business Decision",
"content": """
- Seen more as a cost than an investment.
- Enables business functions but is often treated as separate from business infrastructure.
"""
},
{
"title": "The Reality of Security Analysts",
"content": """
- Shortage of skilled professionals.
- High burnout rates in L1 SOC analyst roles.
- Overwhelmed by data, tools, and lack of actionable insights.
"""
},
{
"title": "Autonomous SOC Expectations",
"content": """
- Fully autonomous SOCs are unrealistic.
- SOC analysts need creativity to solve problems and handle manual tasks effectively.
- Agile/DevOps approaches are being implemented in 84% of organizations to improve processes.
"""
}
]

View File

@ -0,0 +1,27 @@
def get_content():
"""
Returns structured content for general security best practices.
"""
return [
{
"title": "Endpoint Security",
"content": """
- Application allow lists to prevent unauthorized execution.
- Multi-factor authentication for critical accounts.
"""
},
{
"title": "Network Security",
"content": """
- Default deny for outbound traffic.
- Monitor SMB and other protocols for misuse.
"""
},
{
"title": "Incident Response",
"content": """
- First steps: Verify the incident and scope its impact.
- Root cause analysis to prevent recurrence.
"""
}
]

View File

@ -0,0 +1,36 @@
def get_content():
"""
Returns structured content for SOC transformation and modern practices.
"""
return [
{
"title": "Building a Sustainable SOC",
"content": """
- Move away from traditional L1, L2, L3 structures to reduce burnout.
- Enable junior analysts to manage their own incidents with mentoring.
- Focus on creating detection engineers and platform service teams:
- Detection Engineers:
- Investigate, triage, respond.
- Detection and automation creation.
- Platform Service:
- SIEM architecture, playbook development.
- Integration and data pipeline management.
"""
},
{
"title": "Iterative Improvement",
"content": """
- Prioritize actionable improvements and document processes.
- Understand the detection surface to focus on high-value areas.
- Collaborative outsourcing and detection engineering are key.
"""
},
{
"title": "Key Takeaways",
"content": """
1. Build systems to support emerging practitioners.
2. Maintain relentless focus on the mission.
3. Prioritize actionable and iterative improvements.
"""
}
]

View File

@ -0,0 +1,29 @@
def get_content():
"""
Returns structured content from keynote speakers and their insights.
"""
return [
{
"title": "Allie Mellen's Insights",
"content": """
- Works at Forester, MIT, Fortune 500 CISO, and as a principal analyst.
- Focus areas:
- Security operations, detection and response engineering.
- Research on nation-state threats.
- Key Thoughts:
- Autonomous SOCs are unrealistic; manual work is inevitable.
- SOC analysts must develop creative solutions to adapt.
"""
},
{
"title": "Eli Short's Insights",
"content": """
- Issues in Rule Management:
- Most rules are outdated or unused after a few years.
- Organizations fail to track and optimize rule usage.
- Recommendations:
- Adopt threat-informed defense strategies.
- Ensure realistic expectations based on available logs and data.
"""
}
]

View File

@ -0,0 +1,35 @@
def get_content():
"""
Returns structured content for threat detection trends and sector-specific insights.
"""
return [
{
"title": "Top Threat Detection Trends",
"content": """
- Top 20 techniques are common across all industries.
- Most attacks target 10% of T-Codes.
- Detection challenges:
- Volume of detections.
- Technique variance and persistence.
"""
},
{
"title": "Industry-Specific Insights",
"content": """
- **Education**: Email forwarding/hiding rules account for 55% of detections.
- **Manufacturing**: Biggest issue is removable media.
- **Finance & Insurance**: HTML smuggling and distributed component object model attacks.
- **Information Sector**: Unix-based issues, heavy use of Docker, cloud, and servers.
- **Healthcare**: Cron jobs and Unix shell are common targets.
"""
},
{
"title": "Threat Mitigation Focus",
"content": """
- Focus on hygiene, configuration, data, and systems.
- Techniques most affected:
- Powershell, registry modification, malicious files, cmd usage.
- Tool transfers, email hiding, and system utility renaming.
"""
}
]