Skip to content

aring87/Detection-Engineering

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

179 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Detection Engineering

A centralized repository for building, governing, validating, and operationalizing a modern detection engineering program.

Executive Docs Strategy Process Visuals Reporting Detections Governance Triage Guides

This repository serves as a one-stop location for:

  • detection engineering strategy and program documentation
  • detection-as-code content for Microsoft Sentinel
  • validation, tuning, and lifecycle governance
  • ATT&CK and Cyber Kill Chain coverage tracking
  • analyst triage guidance and operational support
  • executive reporting, planning, and maturity development
  • future multi-platform expansion, including Splunk

Purpose

Detection engineering is more than writing alert logic.

A mature program requires structure, repeatable workflows, quality standards, validation, operational triage support, and reporting that connects technical content to program outcomes. This repository is designed to support that full lifecycle, from idea to validated analytic to operational use.


Current Focus

This repository is currently centered on Microsoft Sentinel detection engineering and is being actively refined into a more governed, scalable detection engineering program.

Current priorities include:

  • improving detection quality and consistency
  • standardizing rule schema and metadata
  • reducing duplicate and overlapping analytics
  • strengthening analyst triage guidance
  • improving ATT&CK alignment and lifecycle discipline
  • organizing content for long-term maintainability

Planned future growth includes:

  • expanded automation and validation workflows
  • stronger deployment and reporting pipelines
  • additional platform support such as Splunk
  • shared governance and reporting across security platforms

What This Repository Contains

Detection Content

Detection content is organized as code and grouped by tactic under detections/sentinel/.

Current tactic areas include:

  • browser
  • collection
  • command-and-control
  • credential-access
  • defense-evasion
  • discovery
  • execution
  • exfiltration
  • impact
  • initial-access
  • lateral-movement
  • persistence
  • privilege-escalation
  • reconnaissance
  • resource-development
  • deprecated

Triage Guides

Analyst-facing triage content is maintained under content/triage-guides/ and is intended to support consistent investigation, escalation, and response.

Governance

Governance content defines the standards used to maintain quality and consistency across the repository, including naming, severity, lifecycle, tagging, and rule quality expectations.

Program Documentation

The docs/ structure supports executive communication, strategy, process, reporting, and visual program artifacts.


Start Here

Leadership

Use these documents for program intent, operating model, roadmap, and reporting:

Detection Engineers

Use these resources to build, review, validate, and maintain detection content:

SOC / Incident Response

Use these resources for investigation, escalation, and operational alignment:


Detection Content Cleanup and Standardization

The Sentinel detection catalog has undergone a broad cleanup and normalization effort to improve quality, consistency, and maintainability.

This work included:

  • reviewing rules for duplicate titles and duplicate IDs
  • identifying overlapping or near-duplicate analytics
  • cleaning up inconsistent metadata and ATT&CK mappings
  • improving weak or overly broad logic
  • converting older or package-style rules into a more consistent repository schema
  • aligning detections with stronger triage guidance
  • separating foundational broad analytics from narrower companion detections
  • retaining stronger modern rules while retiring or demoting weaker legacy duplicates

This effort covered content across all major Sentinel tactic folders, including:

  • collection
  • command-and-control
  • credential-access
  • defense-evasion
  • discovery
  • execution
  • exfiltration
  • impact
  • initial-access
  • lateral-movement
  • persistence
  • privilege-escalation
  • reconnaissance
  • resource-development

Resulting Improvements

Key outcomes of this cleanup include:

  • cleaner rule placement by tactic
  • fewer duplicate and near-duplicate detections
  • more consistent schema and metadata
  • improved ATT&CK alignment
  • stronger triage and validation sections
  • clearer lifecycle progression from experimental to production
  • better separation between active, specialized, and deprecated content

Triage Guide Improvements

Triage content has also been reviewed and expanded to better support analyst workflows.

Updated guides are being rewritten into a fuller analyst-playbook style that emphasizes:

  • why the alert matters
  • what the detection is looking for
  • initial triage questions
  • key fields to review
  • step-by-step investigation guidance
  • common benign explanations
  • escalation criteria
  • response actions
  • analyst notes

This is intended to improve operational consistency and make the repository more useful to analysts, responders, and detection engineers alike.


Detection Lifecycle

Detection content should move through a controlled lifecycle:

  • experimental
  • testing
  • production
  • deprecated

Lifecycle progression should reflect validation quality, operational usefulness, tuning maturity, and analyst confidence.

See:


Repository Map

  • docs/ — executive artifacts, strategy, process, visuals, and reporting
  • detections/ — detection content managed as code
  • content/ — templates, triage guides, and reusable operational content
  • governance/ — naming, severity, lifecycle, tagging, and quality standards
  • coverage/ — ATT&CK and Cyber Kill Chain coverage tracking
  • automation/ — scripts, schemas, and deployment helpers
  • tests/ — validation support and testing references
  • .github/ — workflows, templates, and contribution support

Executive Documents

Core program artifacts are located in docs/executive/:


Contribution Model

All content should be version controlled, reviewed, and validated before promotion.

Recommended flow:

  1. Submit a request or change
  2. Review metadata, mapping, and quality
  3. Validate logic and operational usefulness
  4. Document tuning or triage considerations
  5. Merge through pull request review
  6. Promote through lifecycle stages

See:


Long-Term Direction

The long-term goal of this repository is to support a mature, scalable detection engineering program with:

  • governed detection-as-code workflows
  • operationally useful triage content
  • measurable coverage tracking
  • stronger validation and tuning discipline
  • executive-ready reporting
  • reusable standards that can extend beyond Sentinel into additional platforms

License

This repository is licensed under the MIT License. See LICENSE.

About

All things Detection Engineering from Proposal to Detection-as-Code repository for Microsoft Sentinel and eventually Splunk. YAML-based detection rules mapped to MITRE ATT&CK and Cyber Kill Chain stages, enriched with lifecycle tags and automated for CI/CD deployment.

Topics

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages