DEPRECATED - MozDef: Mozilla Enterprise Defense Platform
Перейти к файлу
Gene Wood 1f536dcdd3
Add apiversion as a field forced into string type
This should resolve this error in the esworker_cloudtrail
`RequestError: TransportError(400, u'mapper_parsing_exception', u'failed to parse [details.apiversion]')`
2018-10-25 14:31:20 -07:00
.github Update ISSUE_TEMPLATE.md 2017-06-15 15:05:44 -05:00
alerts Merge remote-tracking branch 'origin/infosec_workweek' into virtualenv_path_change 2018-10-24 13:05:30 -05:00
benchmarking Merge remote-tracking branch 'origin/master' into fix_pep8_errors 2018-10-08 16:20:32 -04:00
bot Merge remote-tracking branch 'origin/infosec_workweek' into virtualenv_path_change 2018-10-24 13:05:30 -05:00
cloudy_mozdef Change AWS ES total field limit to 4000 2018-10-25 14:30:22 -07:00
config Merge remote-tracking branch 'origin/infosec_workweek' into virtualenv_path_change 2018-10-24 13:05:30 -05:00
cron Update missing virtualenv path change 2018-10-24 13:09:51 -05:00
docker Merge pull request #868 from gene1wood/add-cloudtrail-docker-service 2018-10-24 15:32:41 -05:00
docs Update missing virtualenv path change 2018-10-24 13:09:51 -05:00
examples fixup sample data to use local setConfig to avoid deprecation in configlib 2018-10-18 10:40:51 -07:00
lib Moving everything from lib into a package created with cookiecutter 2018-10-16 09:14:18 -07:00
loginput Merge remote-tracking branch 'origin/infosec_workweek' into virtualenv_path_change 2018-10-24 13:05:30 -05:00
meteor remove reference to non-existant css 2018-10-25 08:24:01 -07:00
mozdef_util fix nits 2018-10-23 10:31:27 -07:00
mq Add apiversion as a field forced into string type 2018-10-25 14:31:20 -07:00
rest Merge remote-tracking branch 'origin/infosec_workweek' into virtualenv_path_change 2018-10-24 13:05:30 -05:00
static Remove heatmap html page 2017-06-15 15:07:42 -05:00
systemdfiles Update python virtualenv path for service files 2018-04-20 12:55:26 -05:00
tests Change all files to be compose 2.2 compliant (its either that or all 3.0 2018-10-17 14:33:13 -07:00
.flake8 Merge remote-tracking branch 'origin/master' into fix_pep8_errors 2018-10-08 16:20:32 -04:00
.gitignore Add example aws_parameters file and gitignore 2018-10-24 08:05:41 -07:00
.travis.yml Add language to travisci config 2018-10-22 20:00:52 -05:00
CONTRIBUTING.md Modifying urls to point to mozilla from jeffbryner, slight readability changes. 2017-06-15 15:07:30 -05:00
LICENSE Updated license file to conform with MPL 2014-02-25 09:55:02 -08:00
Makefile makefile must always build base 2018-10-22 16:06:32 -07:00
README.md Update readme to remove references to banhammer 2018-10-04 12:20:10 -04:00
requirements.txt Add mozdef_util to requirements 2018-10-25 12:01:10 -05:00

README.md

Build Status Documentation Status

MozDef: The Mozilla Defense Platform

Why?

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others are readily available to help attackers coordinate, share intelligence and finely tune their attacks in real time. Defenders are usually limited to wikis, ticketing systems and manual tracking databases attached to the end of a Security Information Event Management (SIEM) system.

The Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

Goals:

  • Provide a platform for use by defenders to rapidly discover and respond to security incidents.
  • Automate interfaces to other systems like bunker, cymon, mig
  • Provide metrics for security events and incidents
  • Facilitate real-time collaboration amongst incident handlers
  • Facilitate repeatable, predictable processes for incident handling
  • Go beyond traditional SIEM systems in automating incident handling, information sharing, workflow, metrics and response automation

Status:

MozDef is in production at Mozilla where we are using it to process over 300 million events per day.

DOCS:

http://mozdef.readthedocs.org/en/latest/