mirror of
https://github.com/0x4D31/awesome-threat-detection.git
synced 2024-10-01 05:25:57 +00:00
Add MITRE Engage (replaced Shield)
MITRE replaced Shield with Engage to focus on the areas of denial, deception, and adversary engagement.
This commit is contained in:
parent
09c1eb8d8e
commit
432a5f1fb8
@ -190,7 +190,10 @@
|
|||||||
- [The DML Model](http://ryanstillions.blogspot.com.au/2014/04/the-dml-model_21.html) - The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks.
|
- [The DML Model](http://ryanstillions.blogspot.com.au/2014/04/the-dml-model_21.html) - The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks.
|
||||||
- [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
|
- [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
|
||||||
- [OSSEM](https://github.com/hunters-forge/OSSEM) (Open Source Security Events Metadata) - A community-led project that focuses on the documentation and standardization of security event logs from diverse data sources and operating systems
|
- [OSSEM](https://github.com/hunters-forge/OSSEM) (Open Source Security Events Metadata) - A community-led project that focuses on the documentation and standardization of security event logs from diverse data sources and operating systems
|
||||||
- [MITRE Shield](https://shield.mitre.org) - A knowledge base of active defense techniques and tactics ([Active Defense Matrix](https://shield.mitre.org/matrix/))
|
- [MITRE Engage](https://engage.mitre.org/) - A framework
|
||||||
|
for planning and discussing adversary engagement operations
|
||||||
|
that empowers you to engage your adversaries
|
||||||
|
and achieve your cybersecurity goals.
|
||||||
- [MaGMa Use Case Defintion Model](https://www.betaalvereniging.nl/wp-content/uploads/FI-ISAC-use-case-framework-verkorte-versie.pdf) - A business-centric approach for planning and defining threat detection use cases.
|
- [MaGMa Use Case Defintion Model](https://www.betaalvereniging.nl/wp-content/uploads/FI-ISAC-use-case-framework-verkorte-versie.pdf) - A business-centric approach for planning and defining threat detection use cases.
|
||||||
|
|
||||||
### DNS
|
### DNS
|
||||||
|
Loading…
Reference in New Issue
Block a user