Detection and Response
Section focus: Detection and Response.
Best use: start with the section map below, then move into the deeper pages that match your role or stack.
Design note: this index was refreshed to act as a cleaner GitBook landing page instead of a plain directory listing.
Start with these pages
Related sections
Intro: A modern Product Security program is incomplete if it can only say how to harden. It also needs to say what to log, what to detect, how to triage, and how to preserve evidence when a product team is suddenly in the middle of an incident.
What this page includes
- logging and telemetry strategy for app, API, cloud, CI/CD, and Kubernetes
- high-signal detections instead of noisy wish lists
- triage and evidence-preservation guidance
- product-focused incident response playbooks
Working assumptions
- the goal is to help product and platform teams act before a full SOC handoff exists
- detections should be explainable to engineering and tuned against known workflows
Figure: threat modeling to telemetry to detections to playbooks.
Section map
| Page | Why it belongs here |
|---|---|
| Logging and Telemetry Strategy | Defines the event classes worth paying to retain. |
| High-Signal Detection Patterns and SIEM Examples | Focuses on detections that repeatedly catch meaningful product abuse and identity misuse. |
| Product Security Incident Response Playbooks | Provides scenario-driven guidance for product and platform incidents. |
| ๐ฆ Falco Runtime Detection Practical Guide | Adds practical runtime rules, deployment examples, and legacy-vs-current guidance for Falco-based runtime detection. |
| ๐๏ธ Runtime Detection Stack โ Falco, Tetragon, and Cloud Signals | Places Falco next to Tetragon, cloud audit logs, and investigation workflows. |
| ๐ก๏ธ Sysdig Secure โ Platform Guide | Explains the commercial platform around Falco-aligned runtime, vulnerability, posture, and response workflows. |
| ๐ก๏ธ Runtime Security / Detection / Incident Response / Resilience โ Operating Model and Product Map | Gives a compact operating model plus a pragmatic top-10 solution map across open-source and commercial options. |
| Cloud and Kubernetes Runtime Investigation Playbooks and Containment Templates | Adds case structure and containment templates for the first hour of a runtime incident. |
Operating principle
Detection engineering is not a separate kingdom. It should be the downstream output of threat modeling, architecture review, and platform control decisions.
Related pages
Author attribution: Ivan Piskunov, 2026 - Educational and defensive-engineering use.