This Cloud Analytics project researched and developed best practices to help defenders improve their ability to detect adversary behaviors in today's complex cloud environments. This repository contains behavioral analytics to detect attacks to cloud platforms and a blueprint for how others can create and use cloud analytics effectively.
Resource | Description |
---|---|
Blueprint Document | Best practices and lessons learned for developing cloud analytics. |
Analytics | Analytics generated in Sigma format for the project. |
CALDERA Emulation Tips | Documentation on reproducing adversary emulation using Caldera. |
Sigma Rule Information | Documentation on using Sigma rules in relation to Cloud Analytics. |
Support Resources | Resources not part of final deliverable, but potentially useful. |
Please submit issues for any technical questions/concerns or contact [email protected] directly for more general inquiries.
Also see the guidance for contributors if are you interested in contributing or simply reporting issues.
Copyright 2022 MITRE Engenuity. Approved for public release. Document number CT0053
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
This project makes use of ATT&CK®