Summary
In this chapter, we discussed the high-level process of how defenses should be improved and inventoried several frameworks and models that can help us with this task.
Then, we also dove deeper into two types of security controls: prevention and detection. We saw that detection embeds threat hunting as another type of detective security control. For each of them, we saw guidelines and a management framework to help build maturity around these types of controls. We also saw three key types of rule formats: SIGMA for a SIEM signature, YARA for a file signature, and Snort for a network signature.
Finally, we discussed a short workflow that helps us decide on the type of security controls that should be implemented.
All blue teams', as well as Red teams', activities rely on bigger or smaller infrastructure. The next part of the book is dedicated to building those. We will see the red, blue, and purple teams' infrastructures and components, beginning with...