This site contains technical information to support WA Government Cyber Security activities. Please propose updates directly via the edit link on each page or email [email protected] with any feedback. The site is built with Material for MkDocs (reference) which includes several extensions to markdown for enhanced technical writing.
!!! tip "RSS Feeds" If you would like to subscribe to updates for this site please use the RSS or ATOM feeds.
- Connecting to the WA SOC (Sentinel Guidance)
- Advisories (TLP:CLEAR)
- Incident Reporting User Guide (Jira)
- Threat Hunting (MITRE ATT&CK Tactics and Techniques)
- ACSC Essential Eight Assessment Process Guide
Baselines are for use as self-assessment checklists, and guidelines are for general implementation guidance.
!!! abstract "Baselines" - Security Operations Baseline - aligned with MITRE 11 Strategies of a World-Class Cybersecurity Operations Center and ACSC's Cyber Incident Response Plan Resource. - Detection Coverage Baseline - telemetry collection and detection analytics aligned to the MITRE ATT&CK Framework. - Vulnerability Management Baseline - focused on undertaking operational Identify and Protect capabilities.
!!! danger "Critical Infrastructure Entities and Operational Technology" The CISA Cross-Sector Cybersecurity Performance Goals are clear targeted recommendations focusing on most common and impactful threats, including cost, complexity and impact ratings against each recommendation. These are highly relevant targets for entities in scope of SOCI regulatory obligations.
<iframe width="560" height="315" src="https://www.youtube-nocookie.com/embed/podtgMpjVp4?si=rmJ_tqjca9iQX_in" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
!!! tip "Guidelines" - Supply Chain Risk Management Guideline - Implementation guidance for ACSC Cyber Supply Chain Risk Management. - Guide to Securing Remote Access Software (CISA) - remote access software overview, including the malicious use of remote access software, detection methods, and recommendations for all organizations. - #StopRansomware Guide (CISA) - one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover, including step-by-step approaches to address potential attacks. - Microsoft Sentinel Guidance - Implementation guidance for using Sentinel for ACSC Guidelines for System Monitoring - Network Management Guideline - Implementation guidance for ACSC Network gateway hardening. - Patch Management Guideline - Implementation guidance for ACSC Assessing Security Vulnerabilities and Applying Patches.
The below documents are for general use.
!!! note "Technical Documentation" - SOC Analyst Induction - Collecting Digital Forensic Evidence - Cyber Security Playbooks
{% include 'threat-activity.md' %}
<script> if (window.location.hash && window.location.hash[1] === "/") { var location_parts = window.location.hash.slice(1).split("?id="); window.location.hash = ''; if (location_parts[1]) { window.location.hash = location_parts[1]; } window.location.pathname = window.location.pathname + location_parts[0].replace(".md", ""); } </script>