Phase 1: Build Your Detection Library
Your detection library forms the foundation of your strategy. It’s a living system built on your specific business risks, with rules sourced from your team, vendors, and trusted third parties. It evolves as new threats emerge.
Step 1: Prioritize Detections Based on Business Risk
Start with what truly matters to your organization. Map detections to high-impact threats, critical applications, privileged access, and your most likely attack paths. This ensures detection efforts directly align with your business and risk profile.
Step 2: Identify the Data Sources You Need (and Don’t Need)
Effective detection requires visibility. Evaluate:
This prevents wasted storage costs and focuses on data critical for high-fidelity detection.[AT1]
Step 3: Select the Right Mix of Detection Authors
A robust detection program integrates logic from:
Trusted third-party providers provide a wide selection of common detections across a variety of technologies. This should make up the majority of your detection library.
Technology vendors also provide a wide selection of detections specific to their source technologies. Identify and deploy the options with the highest fidelity and turn off anything that produces unnecessary noise.
Internal security teams know their environment best and are uniquely positioned to build their own detections tailored to their environment. These should mainly be used in highly specific use cases.
The goal: a multi-sourced, adaptable detection library with consistent data standards and quality controls.