Summary
We have seen in detail the data sources that can be used for detection and how to set up a collection strategy based on the detection relevancy of data sources. We saw what is interesting (or not) to collect, and how to leverage additional technologies, such as IDSs, vulnerability scanners, and deceptive technology. We also saw how to build efficient attack prediction and how to effectively use threat feeds in our overall security program.
In the next chapter, we will discuss SIEM capabilities, correlation, and functions for the blue team to prepare to detect and perform purple teaming activities properly.