Chapter 7: Blue Team – Detect
In the previous chapter, we explained how to implement an efficient log collection architecture for various types of data sources. These techniques allow us to go forward to the next phase: Detect.
We often see organizations integrating all the logs and data sources of their company; this is, unfortunately, often a recommendation provided by Security Information and Event Management (SIEM) vendors and/or Managed Security Service Providers (MSSPs) (especially for volume and licensing costs). In fact, quality should go over quantity. In this chapter, we will present the different data sources that, from our point of view, are mandatory to be implemented for any blue team. We will go one step further by explaining what exactly should be collected and for what reasons, and also discuss the implementation of network detection and deceptive technologies to circumvent attackers' paths and detect them efficiently. In addition, we will present a...