ocsf / examplesLinks
This repo contains example of raw event examples and possible translations to the OCSF schema.
☆40Updated last month
Alternatives and similar repositories for examples
Users that are interested in examples are comparing it to the libraries listed below
Sorting:
- ☆33Updated 4 months ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆373Updated 2 weeks ago
- Convert cloudtrail data to MITRE ATT&CK Sightings☆80Updated 2 years ago
- OCSF Documentation☆132Updated last month
- A Software as a Service (SaaS) log collection framework.☆174Updated last week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆156Updated this week
- Built-in Panther detection rules and policies☆402Updated last week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆164Updated 4 months ago
- Audit log wall of shame.☆41Updated 9 months ago
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆23Updated last week
- ☆44Updated 4 months ago
- ☆65Updated last year
- The SOCless automation framework☆140Updated 5 months ago
- Automated Forensics Orchestrator for Amazon EC2 is a self-service AWS Solution implementation that enterprise customers can deploy to qui…☆64Updated last week
- Helm charts for running open source digital forensic tools in Kubernetes☆103Updated this week
- Command line tool for working with Panther rules and policies☆40Updated last week
- Security Analytics enables users for detecting security threats on their security event log data. It will also allow them to modify/tailo…☆86Updated 2 weeks ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- Automatically generated diagrams for OSCAL models☆20Updated 3 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆53Updated 4 months ago
- ☆33Updated last month
- Security Control Knowledge Graph☆29Updated last year
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆29Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆186Updated 10 months ago
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated 2 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- A compliance analysis tool which enables organizations to more quickly articulate their compliance posture and also generate supporting e…☆46Updated 2 months ago
- Dorothy is a tool to test security monitoring and detection for Okta environments☆184Updated 11 months ago
- Graph-based security analysis for everyone☆345Updated last year