ocsf / examplesLinks
This repo contains example of raw event examples and possible translations to the OCSF schema.
☆50Updated 4 months ago
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- ☆35Updated 9 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆28Updated last week
- Built-in Panther detection rules and policies☆428Updated last week
- Convert cloudtrail data to MITRE ATT&CK Sightings☆81Updated 3 years ago
- Automated Forensics Orchestrator for Amazon EC2 and EKS is a self-service AWS Guidance implementation that enterprise customers can deplo…☆66Updated 3 weeks ago
- Audit log wall of shame.☆42Updated 3 months ago
- OCSF Documentation☆145Updated last month
- A Software as a Service (SaaS) log collection framework.☆179Updated 2 weeks ago
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆91Updated last week
- The SOCless automation framework☆140Updated 10 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆389Updated 4 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- OCSF Schema Validation☆10Updated 11 months ago
- The Auditree framework tool to run compliance control checks as unit tests.☆72Updated last year
- A collection of projects supporting AWS Integration☆156Updated last week
- A library of data visualization dashboard templates that can be imported into JupiterOne.☆18Updated this week
- ☆189Updated 2 weeks ago
- A docker container to simplify and secure the use of Infrastructure as Code (IaC)☆79Updated this week
- Command line tool for working with Panther rules and policies☆44Updated last week
- Graph-based security analysis for everyone☆352Updated 2 weeks ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆166Updated 2 weeks ago
- A standard for reducing log volume without sacrificing analytical capability☆213Updated 9 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆286Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated this week
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆40Updated last month
- Apps to be used for Shuffle automation. Most of Shuffle's apps (2500+) are generated from APIs, and available in the search engine below:☆119Updated 3 weeks ago
- Coalfire AWS RAMP/pak Reference Architecture☆37Updated last year
- ☆48Updated 2 months ago
- Helm charts for running open source digital forensic tools in Kubernetes☆172Updated 3 weeks ago
- ☆52Updated 2 months ago