Cloud Security Office Hours Banner

Build 5 detections in a lab SIEM

Stand up a free SIEM, ship CloudTrail to it, write Sigma rules for 5 MITRE ATT&CK Cloud techniques, validate with Stratus Red Team.

Walkthrough All Portfolio Projects

ยท ยท Vendor-neutral ยท View source on GitHub

Time: ~10 hours  ยท  Difficulty: Intermediate  ยท  Stack: AWS ยท CloudTrail ยท SIEM (Wazuh / Elastic / Matano) ยท Sigma ยท Stratus Red Team

Detection engineering is the cloud security specialty with the lowest barrier-to-entry portfolio in the field. The pattern: get attack telemetry into a SIEM, write detections, prove they fire on the real attack technique. Doing this once on your own โ€” and publishing it โ€” puts you ahead of 80% of detection-engineer applicants.

๐Ÿ“– On this page

  1. What you'll have at the end
  2. Prerequisites
  3. Step-by-step
  4. What hiring managers look for
  5. Common mistakes
  6. Where to publish
  7. Where next

What you'll have at the end

Prerequisites

Step-by-step

1. Pick your SIEM

Three solid free options:

2. Stand up the SIEM

For Wazuh: docker compose up -d with the official compose file gets you running locally in 10 minutes. For Matano: deploy via AWS CDK to a new sub-account.

3. Wire CloudTrail into it

Configure CloudTrail to write to S3, then have the SIEM read from S3 (Matano native; Wazuh + Filebeat for the others). Confirm events are flowing by signing into the AWS console and verifying the sign-in event lands in the SIEM within ~5 minutes.

4. Pick 5 ATT&CK techniques to cover

Don't pick at random. Choose techniques that are (a) common, (b) detectable in CloudTrail, and (c) mapped to real attacker behavior. Recommended starter set:

5. Write the detections

For each technique, write the rule in Sigma and compile it to your SIEM's native query language. Commit both versions to your repo. Annotate each rule with the MITRE ID and a short "why this matters" note.

6. Test with Stratus Red Team

Stratus Red Team from Datadog emulates real attack techniques against AWS. For each of your 5 detections, run the corresponding stratus technique and confirm your rule fires.

stratus list aws
stratus warmup aws.credential-access.ec2-get-password-data
stratus detonate aws.credential-access.ec2-get-password-data

7. Tune false positives

Run the rules against a week of normal CloudTrail and document every false positive. Tune. Document the tuning logic in your write-up. This is the part that separates real detection engineering from "I copied a rule from a blog."

8. Build the coverage map

Use the MITRE ATT&CK Navigator to colour the techniques you cover. Export as JSON, commit to the repo, embed the screenshot in the write-up.

What hiring managers look for

Common mistakes

Where to publish

The full publishing playbook is on the portfolio hub page. The short version: a public GitHub repo with a thorough README is the strongest single signal; pair it with a LinkedIn post and (optionally) a 5-minute lightning talk at a CSOH Friday Zoom.

Where next