Cyber Security Playbooks
Cyber Security Playbooks
Nota importada desde Inbox durante consolidacion bulk.
Resumen
Comprehensive reference to the Western Australia Cyber Security Unit (DGOV) SOC playbooks. Covers the full spectrum of security operations: triage and investigation, incident response (18 IRM-2022 scenarios), vulnerability response, threat hunting, and digital forensics. Aligned with CISA Cybersecurity Incident and Vulnerability Response Playbooks and MITRE 11 Strategies.
Contenido Principal
Core Resources
- Home: WA SOC Portal
- SOC Onboarding: Onboarding Guide
- Advisories (TLP:CLEAR): Security Advisories
- ACSC Strategies to Mitigate: Further Five Guidelines
- TTP Detection: Threat Hunting Guidelines
Baselines
Guidelines
Training
Government Links
1. Triage & Investigation
- Under review; see Sentinel Triage AssistanT (STAT) as an approach to standardize and automate common triage actions
2. Incident Response (IRM-2022)
Based on CERT Societe Generale IRM-2022 (Incident Response Methodologies 2022), covering 18 common scenarios:
- Worm Infection
- Windows Intrusion
- Unix/Linux Intrusion Detection
- DDoS
- Malicious Network Behaviour
- Website Defacement
- Windows Malware Detection
- Blackmail
- Smartphone Malware
- Social Engineering
- Information Leakage
- Insider Abuse
- Customer Phishing
- Scam
- Trademark Infringement
- Phishing
- Ransomware
- Large Scale Compromise
3. Vulnerability Response
Under review; references Patch Operating Systems and Patch Applications
4. Threat Hunting
Under review; Jupyter Notebooks effective for querying datalake repositories; see KQLmagic for Azure Data Explorer
5. Digital Forensics
Under review; see Collecting Evidence and Dissect for modern forensics tooling
Puntos Clave
- Aligned with CISA Cybersecurity Incident and Vulnerability Response Playbooks (508C)
- Aligned with MITRE 11 Strategies of a World-Class Cybersecurity Operations Center
- IRM-2022 covers 18 specific incident types with dedicated response methodologies
- Sections 1, 3, 4, 5 are under review with interim tool recommendations
- Free and publicly available resource suitable for SOC operationalization
Aplicacion Practica
- Use IRM-2022 as basis for incident response procedures when no internal playbook exists
- Adopt baselines for data sources, security operations and vulnerability management
- Use TTP detection guidelines for threat hunting program development
- Training materials suitable for SOC analyst onboarding