A breakdown of the UDEF in steps#
Data and Posture Baseline Lifecycle (DPBL)
a. Understand the environment
b. Understand the data
c. Baseline the data
d. Baseline defensive posture
e. Baseline industry threat coverage
f. Hunt for outliers and unknown threats
Research and Capability Development Scoping (RCDS)
a. Coverage
b. Prevalence
c. Urgency
d. Capability
e. Influence
f. Constraints
Detection Capability Development Lifecycle (DCDL)
a. Research
i. Threat Research Lifecycle (TRL)
Motivation
Contemplation
Collaboration
Observation
Identification
Accumulation
Preservation
Cultivation
b. Capability development and testing
c. Release | activate
d. Monitor | triage
e. Tune or deprecate
f. Hunt for known threats
Detection Engineering as Code (DEaC)
a. Detections as code
b. Operationalize telemetry and metrics