Blue Team Defense & Hardening
🔵 Blue Team Defense & Hardening
Overview
This skill assists defenders with system hardening, detection rule engineering, security baselines, patch management, and security architecture review.
Prerequisites
- Python 3.8+,
pyyaml,jinja2
pip install pyyaml jinja2 requests
Core Capabilities
1. System Hardening
Linux: Disable unnecessary services, SSH hardening, fail2ban, firewall (iptables/nftables), auditd, SELinux/AppArmor, sysctl tuning, SUID cleanup.
Windows: CIS Benchmark GPOs, Defender ASR rules, AppLocker/WDAC, disable LLMNR/NBT-NS, PowerShell logging, Credential Guard, LAPS, Sysmon.
2. Detection Engineering
Create Sigma, Splunk SPL, KQL, EQL, YARA, and Snort/Suricata rules. Define TP/FP criteria, test against known data, document in detection catalog.
3. Security Baseline Monitoring
Define normal behavior, monitor deviations (new services/processes/connections), FIM, track privileged account usage, software inventory.
4. Patch Management
Assess CVSS criticality, plan deployment timelines, pre-patch testing, rollback procedures, compliance reports, patch debt tracking.
5. Security Architecture Review
Defense-in-depth, network segmentation, zero trust, IAM maturity, endpoint protection stack, logging coverage, backup/DR.
Script Reference
hardening_checker.py
python scripts/hardening_checker.py --os ubuntu --output report.json
python scripts/hardening_checker.py --os windows --cis-level 1 --output report.json
Integration Guide
- ← All Offensive Skills: Receive findings for defensive improvements
- → CSOC Automation (11): Deploy detection rules
- → Log Analysis (12): Feed baselines for anomaly detection
- → Threat Hunting (06): Identify coverage gaps
References
More from masriyan/claude-code-cybersecurity-skill
exploit development & payload engineering
Proof-of-concept development, payload crafting, shellcode generation, and exploitation techniques
10vulnerability scanning & assessment
Automated vulnerability scanning, CVE detection, dependency auditing, and security configuration assessment
7malware analysis & sandboxing
Static/dynamic malware analysis, YARA rule generation, sandbox configuration, and behavioral profiling
7