Summary
In this chapter, we learned how to model an incremental maturity pattern based on typical organizational resource constraints in a three-phase manner. We were able to examine the details of the differences between each phase, along with their costs and suggested implementation approaches. Finally, we wrapped up our last lab on how Google Colab can host Jupyter-style notebooks for the purposes of a follow-the-sun model for co-developing with other detection engineers.
Congratulations on completing this course. I hope you enjoyed learning the different mechanisms of operating a highly efficient engineering program utilizing detection-as-code mechanisms. We covered everything from ad hoc automation of CTI ingestion to implementing entire CI/CD pipelines with automated testing of detections for various enterprise security tooling.