Summary
So far we have discussed the importance of having a method to standardize logs and to share detections. First we covered the importance of using data dictionaries, the OSSEM project and MITRE CAR project. Then, we reviewed Sigma rules, an incredible powerful tool to share detection between security analyst and researchers. In the following chapter we are going to learn about how to emulate threat actors in our environment before we can start hunting!