MarkSimos / MCRALinks
The Microsoft Cybersecurity Reference Architecture (https://aka.ms/MCRA) describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities.
☆20Updated 7 years ago
Alternatives and similar repositories for MCRA
Users that are interested in MCRA are comparing it to the libraries listed below
Sorting:
- ☆133Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Controls Assessment Specification☆70Updated 4 months ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- DDTTX Tabletop Trainings☆28Updated 3 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆124Updated 4 years ago
- Incident Response Hierarchy of Needs☆463Updated 2 years ago
- Building environments to replicate small networks and deploy applications☆325Updated 7 months ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 2 years ago
- CASCADE Server☆272Updated 2 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 10 months ago
- Windows Defender ATP - Advanced Hunting Queries☆22Updated 7 years ago
- Windows Event Forwarding subscriptions, configuration files and scripts that assist with implementing ACSC's protect publication, Technic…☆223Updated 6 months ago
- ☆55Updated 4 years ago
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆289Updated 4 years ago
- Documentation on the Cyber Defense Matrix☆24Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Updated last year
- A python package for use in generating fake data for SOC and security automation.☆170Updated 5 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆388Updated last year
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- ☆97Updated 2 years ago
- Repository with Sample KQL Query examples for Threat Hunting☆215Updated 3 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆154Updated 5 months ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆115Updated 10 months ago