Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Automating Security Detection Engineering
Automating Security Detection Engineering

Automating Security Detection Engineering: A hands-on guide to implementing Detection as Code

eBook
₱1571.99 ₱2245.99
Paperback
₱1963.99 ₱2806.99
Subscription
Free Trial

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Automating Security Detection Engineering

Detection as Code Architecture and Lifecycle

Welcome to the courseware, where we dive deep into various aspects of automation surrounding detection engineering. Throughout various sections of this book, we’ll be putting concepts to use with follow-along labs and exercises recommended for solidifying and applying knowledge as you progress. In addition, we’ll have spotlights from industry-leading experts who provide supplemental insights that align with the practices that you will encounter.

Detection engineering operations are relied on to create robust detection use cases at scale. As the business grows, the requirements for new detections also grow and it becomes difficult to scale without continued automation. As practitioners, we need to build mechanisms that optimize consistency in detection development.

This chapter focuses on understanding the key elements of maturing a detection engineering program for developing use cases and leveraging automation. We&...

Establish requirements

This is the start of the detection life cycle phase where engineering teams should determine what is in scope for the program and what qualifies as a useful detection to develop. What qualifies as useful input depends on what tools and available data are within the enterprise environment to leverage. Using the following table, we can map example inputs with possible detection outputs based on input requirements:

...

Common Requests

Inputs Needed

Possible Outputs

New Vulnerability Exploit Detection

Network or endpoint payload information

Runtime logging

Possible code-level changes of the patch

Endpoint detection response (EDR) signature

Network intrusion detection system (NIDS) signature

Runtime application security protection (RASP) signature

Conceptualizing detection as code requirements

Now that we have established the life cycle of a use case from a detection engineering perspective, technical systems are needed to implement this to scale. As mentioned, CI/CD pipelines are part of it, but the core components will almost always require the following technical considerations:

  • Version control systems (with CI runners)
  • API support
  • Use case syntax
  • Testing instrumentation
  • Secrets management

Let’s discuss each component in detail.

Version control systems

Modern version control systems will have similar features among major brands and products. Your organization’s developer team may elect to use different systems for their own workflow preferences or compatible integrations with other secrets management systems, third-party risk, and cost considerations. When practical, consider aligning the detection-as-code program to approved and supported security patterns of the enterprise...

Planning automation milestones

Now that we’ve established our minimum viable product (MVP) requirements for a successful detection as code technical set of solutions, it’s time to make decisions on the different key components of the engineering program including scope, technology stack selection, and a target roll-out schedule. Your team has different requirements and priorities depending on the organization than other departments.

Let’s establish a basic checklist of goals that must be determined before embarking on the journey:

Program Component

Decision Examples

Team Justification

Use Case Target Scope

SIEM, EDR, and Bash shell cloud workload runtimes.

Meets all requirements including API and detection syntax support.

CI/CD Pipeline Stack Components

...

Summary

In this chapter, we’ve learned about the core concepts of what’s involved in successfully managing use cases for detection-engineering-focused teams. These include a life cycle that involves establishing requirements, development, testing, implementation, and deprecation. To facilitate that life cycle, we needed to determine what technology components and solutions were able to achieve this in a highly automated capacity.

Choosing the types of technologies based on organization-approved solutions and stack requirements included version control system, build job running compute, build time testing instrumentation, secrets management, and ensuring adequate support for each enterprise tool that was available in their APIs and an established use case syntax.

We finally wrapped up all of our decisions by utilizing a simple checklist, decision, and justification matrix to help our organization understand the impact and advantages of investing time and resources...

Further reading

To learn more about the topics that were covered in this chapter, take a look at the following:

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Create automated CI/CD pipelines for testing and implementing threat detection use cases
  • Apply implementation strategies to optimize the adoption of automated work streams
  • Use a variety of enterprise-grade tools and APIs to bolster your detection program
  • Purchase of the print or Kindle book includes a free PDF eBook

Description

Today's global enterprise security programs grapple with constantly evolving threats. Even though the industry has released abundant security tools, most of which are equipped with APIs for integrations, they lack a rapid detection development work stream. This book arms you with the skills you need to automate the development, testing, and monitoring of detection-based use cases. You’ll start with the technical architecture, exploring where automation is conducive throughout the detection use case lifecycle. With the help of hands-on labs, you’ll learn how to utilize threat-informed defense artifacts and then progress to creating advanced AI-powered CI/CD pipelines to bolster your Detection as Code practices. Along the way, you'll develop custom code for EDRs, WAFs, SIEMs, CSPMs, RASPs, and NIDS. The book will also guide you in developing KPIs for program monitoring and cover collaboration mechanisms to operate the team with DevSecOps principles. Finally, you'll be able to customize a Detection as Code program that fits your organization's needs. By the end of the book, you'll have gained the expertise to automate nearly the entire use case development lifecycle for any enterprise.

Who is this book for?

This book is for security engineers and analysts responsible for the day-to-day tasks of developing and implementing new detections at scale. If you’re working with existing programs focused on threat detection, you’ll also find this book helpful. Prior knowledge of DevSecOps, hands-on experience with any programming or scripting languages, and familiarity with common security practices and tools are recommended for an optimal learning experience.

What you will learn

  • Understand the architecture of Detection as Code implementations
  • Develop custom test functions using Python and Terraform
  • Leverage common tools like GitHub and Python 3.x to create detection-focused CI/CD pipelines
  • Integrate cutting-edge technology and operational patterns to further refine program efficacy
  • Apply monitoring techniques to continuously assess use case health
  • Create, structure, and commit detections to a code repository

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Jun 28, 2024
Length: 252 pages
Edition : 1st
Language : English
ISBN-13 : 9781837631421
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning

Product Details

Publication date : Jun 28, 2024
Length: 252 pages
Edition : 1st
Language : English
ISBN-13 : 9781837631421
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₱260 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just ₱260 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 6,070.97 8,675.97 2,605.00 saved
The Ultimate Kali Linux Book
₱1963.99 ₱2806.99
Practical Threat Detection Engineering
₱2142.99 ₱3061.99
Automating Security Detection Engineering
₱1963.99 ₱2806.99
Total 6,070.97 8,675.97 2,605.00 saved Stars icon

Table of Contents

15 Chapters
Part 1: Automating Detection Inputs and Deployments Chevron down icon Chevron up icon
Chapter 1: Detection as Code Architecture and Lifecycle Chevron down icon Chevron up icon
Chapter 2: Scoping and Automating Threat-Informed Defense Inputs Chevron down icon Chevron up icon
Chapter 3: Developing Core CI/CD Pipeline Functions Chevron down icon Chevron up icon
Chapter 4: Leveraging AI for Use Case Development Chevron down icon Chevron up icon
Part 2: Automating Validations within CI/CD Pipelines Chevron down icon Chevron up icon
Chapter 5: Implementing Logical Unit Tests Chevron down icon Chevron up icon
Chapter 6: Creating Integration Tests Chevron down icon Chevron up icon
Chapter 7: Leveraging AI for Testing Chevron down icon Chevron up icon
Part 3: Monitoring Program Effectiveness Chevron down icon Chevron up icon
Chapter 8: Monitoring Detection Health Chevron down icon Chevron up icon
Chapter 9: Measuring Program Efficiency Chevron down icon Chevron up icon
Chapter 10: Operating Patterns by Maturity Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.6
(11 Ratings)
5 star 81.8%
4 star 9.1%
3 star 0%
2 star 9.1%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Eduardo Aug 15, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
O livro abre a mente para projetos
Subscriber review Packt
Amazon Customer Jul 09, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Most books talk about the importance and skipping over how to actually automate security detection but Mr. Chow doesn’t skip any steps!
Amazon Verified review Amazon
LA-Listing Jul 31, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Automating Security Detection Engineering" by Dennis Chow is a comprehensive guide that delves into the automation of detection engineering processes, from lifecycle planning to practical implementation. The book systematically covers key areas such as threat-informed defense inputs, CI/CD pipeline functions, and the use of AI for use case development and testing. The hands-on labs offer readers practical experience in automating security workflows and conducting validation testing. The text also explores critical metrics for monitoring detection health and measuring program efficiency, providing actionable insights for both tactical and strategic improvements. Overall, it's a recommended read for professionals seeking to enhance their understanding and application of automation in security detection engineering.
Amazon Verified review Amazon
Duy Vo Oct 17, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Automating Security Detection Engineering" by Dennis Chow is an invaluable resource for cybersecurity professionals looking to advance their skills in detection engineering. Its focus on automation, practical labs, and expert insights make it a must-read for those aiming to implement and optimize a DAC program. While it may be challenging for beginners, those with a foundational understanding of cybersecurity will find this book immensely beneficial in enhancing their detection capabilities.
Amazon Verified review Amazon
Sanjay Reddy Jul 04, 2024
Full star icon Full star icon Full star icon Full star icon Full star icon 5
As someone who started out as a technical business analyst and has since specialized in security operations, I have to say that this book written by Dennis is an absolutely wonderful guide for security automation detection.So much time is spent on repetitive tasks when security professionals really need time to investigate larger and more impactful issues.Automation is so crucial to ensuring a security operations center can maintain efficiency and effectively address issues.Dennis really knows what he’s talking about in this book. This guide is truly essential for any security professional.A big thanks to Dennis for sharing this knowledge with us!
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.