ocsf / examplesLinks
This repo contains example of raw event examples and possible translations to the OCSF schema.
☆45Updated 2 months ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- ☆33Updated 7 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆384Updated 2 months ago
- Built-in Panther detection rules and policies☆419Updated this week
- OCSF Documentation☆141Updated 2 weeks ago
- Command line tool for working with Panther rules and policies☆42Updated this week
- A Software as a Service (SaaS) log collection framework.☆178Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆163Updated last week
- Graph-based security analysis for everyone☆350Updated last year
- The SOCless automation framework☆140Updated 7 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆24Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 3 years ago
- Audit log wall of shame.☆42Updated last month
- A standard for reducing log volume without sacrificing analytical capability☆209Updated 7 months ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆90Updated last week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 7 months ago
- ☆187Updated 2 weeks ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆65Updated 2 months ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆57Updated 2 months ago
- A simple open source command line tool to support common operations over OSCAL content.☆54Updated 2 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆215Updated last year
- ☆65Updated last year
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆55Updated 6 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆284Updated last year
- ☆50Updated 3 weeks ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆80Updated this week
- Splunk Content Control Tool☆119Updated 2 weeks ago
- ☆35Updated 4 months ago
- A collection of projects supporting AWS Integration☆155Updated last month
- The Auditree framework tool to run compliance control checks as unit tests.☆71Updated last year