DEPRECATED - MozDef: Mozilla Enterprise Defense Platform
Перейти к файлу
Anthony Verez 8cf8de3808 netantho-105-ttl: try ttl field -> _ttl field to fix expiration 2014-05-19 14:54:46 -07:00
benchmarking averez-19-samples: move json2Mozdef.py to /benchmarking/workers/ 2014-04-22 09:15:41 -07:00
bot moar sleep for the bot to accomodate starting via uwsgi 2014-05-02 16:06:27 -07:00
cron netantho-105-ttl: fix json syntax in index template setup script 2014-05-16 16:45:51 -07:00
docker averez-esworker-fix: restore github repo for docker config 2014-05-06 17:08:50 -07:00
docs averez-docs: add documentation for frontend processing 2014-05-06 15:38:46 -07:00
examples netantho-105-ttl: try fixing config file path for esworker ttl plugin 2014-05-16 14:52:09 -07:00
initscripts init script for da bot 2014-05-02 09:30:28 -07:00
lib pep8 improvements, moar kang credits, don't log long error messages 2014-05-01 12:57:24 -07:00
loginput averez-docker: finally got loginput working, still need to enable and check other workers 2014-05-05 18:10:43 -07:00
logs [meteor] gitignore and bug fix when empty ES 2014-03-07 10:25:54 -08:00
meteor averez-56-healthinfo: fix disk spaces units and various stuff 2014-05-02 18:18:47 -07:00
mq netantho-105-ttl: try ttl field -> _ttl field to fix expiration 2014-05-19 14:54:46 -07:00
rest averez-27-dashboards-listing: use config file for settings for kibana urls 2014-04-17 11:53:09 -07:00
.gitignore averez-docs: add documentation for frontend processing 2014-05-06 15:38:46 -07:00
.gitmodules Use the submodule for the mozdef python client lib 2014-04-02 11:34:39 -07:00
CONTRIBUTING.md averez-issue-23-contributing: add CONTRIBUTING.md 2014-04-14 08:53:42 -07:00
LICENSE Updated license file to conform with MPL 2014-02-25 09:55:02 -08:00
README.md add read the docs link 2014-03-23 13:06:38 -07:00
analyze_code.sh averez-22-license: Fix license stuff (Closes #22) 2014-04-16 11:40:15 -07:00
requirements.txt averez-requirements: oops, remove duplicate requirements 2014-05-05 11:11:52 -07:00

README.md

===================================== MozDef: The Mozilla Defense Platform

Why?

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others are readily available to help attackers coordinate, share intelligence and finely tune their attacks in real time. Defenders are usually limited to wikis, ticketing systems and manual tracking databases attached to the end of a Security Information Event Management (SIEM) system.

The Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

Goals:

  • Provide a platform for use by defenders to rapidly discover and respond to security incidents.
  • Automate interfaces to other systems like bunker, banhammer, mig
  • Provide metrics for security events and incidents
  • Facilitate real-time collaboration amongst incident handlers
  • Facilitate repeatable, predictable processes for incident handling
  • Go beyond traditional SIEM systems in automating incident handling, information sharing, workflow, metrics and response automation

Status:

MozDef is in early proof of concept phases at Mozilla.

DOCS:

http://mozdef.readthedocs.org/en/latest/