Step 1: Research and Build Your Detection Library
Why: Building a comprehensive detection library, rather than creating one-off detections, fosters a strong, proactive, and adaptable strategy.
Assess your needs: Identify the biggest risks to your organization and critical assets that need protection. You may also want to take into account the results of penetration tests, any emerging threats to your industry, or past cyber incidents. Prioritize top detections: Based on your research, rank your most-needed detections and determine how to allocate your resources. Identify needed data sources: Some detections may require diverse data sources for comprehensive visibility and quick threat identification. Make sure you know what those are in advance. Determine detection authors: Include detections from technology vendors, internal teams, and third-party providers for a multi-layered detection strategy. Put it all together: Once you have all these pieces, craft and document your detections. |

