Detection Rules (Threat Detection Logic)
3 RULES
MITRE ATT&CK MAPPED
📋 Show Implementation Proof
Location: detection-rules/ directory
Rules Created:
• Suspicious Process Execution (MITRE TA0002)
• Brute Force Detection (MITRE T1110)
• Data Exfiltration Detection (MITRE T1041)
Format: Elastic Detection Rule JSON
Threat Intelligence (Indicators of Compromise - IOCs)
52,460 IOCs
LIVE FEED INTEGRATION
📋 Show Collection Proof
Source: URLHaus abuse.ch threat feed
Collection: Python automation script
Evidence: threat_intel_iocs_*.json files
Execution: python3 threat-intelligence/urlhaus-integration.py
Vulnerability Management (Security Scanning)
SCANS COMPLETED
TRIVY IMPLEMENTED
📋 Show Scanning Proof
Tool: Trivy (Aqua Security)
Scanned: Elasticsearch & Kibana container images
Results: trivy-kibana-scan.json
Automation: vulnerability-scan.sh script