A playbook, also known as a standard operating procedure (SOP), consists of a set of guidelines to handle security incidents and alerts in the SOC.
Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.
These gudelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.
Source: https://github.com/certsocietegenerale/IRM/tree/main/EN
- ✅Worm Infection: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-1-WormInfection.pdf
- ✅Social Engineering: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-10-SocialEngineering.pdf
- ✅Information Leakage: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-11-InformationLeakage.pdf
- ✅Insider Abuse: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-12-InsiderAbuse.pdf
- ✅Customer Phishing: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-13-Customer_Phishing.pdf
- ✅Scam: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-14-Scam.pdf
- ✅Trademark infringement: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-15-Trademark%20infringement.pdf
- ✅Phishing: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-16-Phishing.pdf
- ✅Ransomware: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-17-Ransomware.pdf
- ✅Large_scale_compromise: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-18-Large_scale_compromise.pdf
- ✅3rd-party_compromise: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-19-3rd-party_compromise.pdf
- ✅Windows Intrusion: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-2-WindowsIntrusion.pdf
- ✅Unix Linux lntrusionDetection: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-3-UnixLinuxIntrusionDetection.pdf
- ✅DDOS: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-4-DDOS.pdf
- ✅MaliciousNetworkBehaviour: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-5-MaliciousNetworkBehaviour.pdf
- ✅Website-Defacement: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-6-Website-Defacement.pdf
- ✅WindowsMalwareDetection: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-7-WindowsMalwareDetection.pdf
- ✅Blackmail: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-8-Blackmail.pdf
- ✅SmartphoneMalware.pdf: https://github.com/certsocietegenerale/IRM/blob/main/EN/IRM-9-SmartphoneMalware.pdf