ocsf / examplesLinks
This repo contains example of raw event examples and possible translations to the OCSF schema.
☆49Updated 3 months ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- ☆34Updated 8 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆26Updated this week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆81Updated 3 years ago
- OCSF Documentation☆144Updated last month
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆91Updated 2 weeks ago
- Built-in Panther detection rules and policies☆426Updated last week
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Updated this week
- Knowledge Report Alert & Normalization Generator☆27Updated last year
- ☆51Updated 2 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆387Updated 3 months ago
- A Software as a Service (SaaS) log collection framework.☆179Updated this week
- Audit log wall of shame.☆42Updated 3 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Graph-based security analysis for everyone☆351Updated last year
- Command line tool for working with Panther rules and policies☆44Updated last week
- A collection of projects supporting AWS Integration☆156Updated 2 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 4 months ago
- Posture Attribute Collection and Evaluation☆24Updated 2 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Updated 3 weeks ago
- ☆28Updated 3 weeks ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 8 months ago
- ☆48Updated last month
- Helm charts for running open source digital forensic tools in Kubernetes☆171Updated this week
- The SOCless automation framework☆140Updated 9 months ago
- ☆15Updated 2 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated 2 years ago
- A standard for reducing log volume without sacrificing analytical capability☆211Updated 8 months ago
- Security Control Knowledge Graph☆31Updated last year