Reader small image

You're reading from  Practical Threat Detection Engineering

Product typeBook
Published inJul 2023
PublisherPackt
ISBN-139781801076715
Edition1st Edition
Right arrow
Authors (3):
Megan Roddie
Megan Roddie
author image
Megan Roddie

Megan Roddie is an experienced information security professional with a diverse background ranging from incident response to threat intelligence to her current role as a detection engineer. Additionally, Megan is a course author and instructor with the SANS Institute where she regularly publishes research on cloud incident response and forensics. Outside of the cyber security industry, Megan trains and competes as a high-level amateur Muay Thai fighter in Austin, TX.
Read more about Megan Roddie

Jason Deyalsingh
Jason Deyalsingh
author image
Jason Deyalsingh

Jason Deyalsingh is an experienced consultant with over nine years of experience in the cyber security space. He has spent the last 5 years focused on digital forensics and incident response (DFIR). His current hobbies include playing with data and failing to learn Rust.
Read more about Jason Deyalsingh

Gary J. Katz
Gary J. Katz
author image
Gary J. Katz

Gary J. Katz is still trying to figure out what to do with his life while contemplating what its purpose really is. While not spiraling into this metaphysical black hole compounded by the plagues and insanity of this world, he sometimes thinks about cyber security problems and writes them down. These ruminations are, on occasion, captured in articles and books.
Read more about Gary J. Katz

View More author details
Right arrow

Phase 3 – Investigate

The Investigate phase has multiple goals, but fundamentally, it needs to prepare a detection requirement for development by converting the detection requirements into more technical ones. Executing this process can identify deficiencies in intelligence or data collection, which will need to be resolved before development can start. The following are the inputs and outputs associated with this phase:

  • Input: Triaged detection requirement
  • Output: Detection of technical specifications and data engineering requirements (if applicable)

The Investigate phase can be broken into four steps:

  1. Identify the data source
  2. Determine detection indicator types
  3. Research
  4. Establish validation criteria

Let’s take a look.

Identify the data source

During this step, you must identify the relevant data sources needed to satisfy the detection requirement. Analysts will need to understand the intent and scope of the detection...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Practical Threat Detection Engineering
Published in: Jul 2023Publisher: PacktISBN-13: 9781801076715

Authors (3)

author image
Megan Roddie

Megan Roddie is an experienced information security professional with a diverse background ranging from incident response to threat intelligence to her current role as a detection engineer. Additionally, Megan is a course author and instructor with the SANS Institute where she regularly publishes research on cloud incident response and forensics. Outside of the cyber security industry, Megan trains and competes as a high-level amateur Muay Thai fighter in Austin, TX.
Read more about Megan Roddie

author image
Jason Deyalsingh

Jason Deyalsingh is an experienced consultant with over nine years of experience in the cyber security space. He has spent the last 5 years focused on digital forensics and incident response (DFIR). His current hobbies include playing with data and failing to learn Rust.
Read more about Jason Deyalsingh

author image
Gary J. Katz

Gary J. Katz is still trying to figure out what to do with his life while contemplating what its purpose really is. While not spiraling into this metaphysical black hole compounded by the plagues and insanity of this world, he sometimes thinks about cyber security problems and writes them down. These ruminations are, on occasion, captured in articles and books.
Read more about Gary J. Katz