From the course: Modern Security Operation by Google

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Example workflows

Example workflows

- [Instructor] To illustrate this in a real world scenario, suppose there is a malicious email attachment. Here is an example of the engineering workflow that would take place. The workflow begins with use case research and creation. The cyber threat engineering team leveraging insights from Mandiant Threat Intelligence conducts research on the latest email-based threats, including malicious attachments. They identify relevant indicators, attack techniques, and patterns associated with these threats. Based on their research, they create use cases in Jira, outlining the specific criteria and logic for detecting malicious email attachments and mapping them to the MITRE ATT&CK framework. Analytics development then takes place. The detection engineering team leverages the use cases developed in Jira and collaborates with previous teams to ensure that Chronicle SIEM, the organization's security information and event…

Contents