Tutorials

This site is a collection of use cases for Attack Flow and Flow Manager.

The Flow Manager tutorials section is still under construction. New use cases will be added over time.

Attack Flow and Flow Manager are useful for a wide range of security use cases.

  • Attack Simulation - Learn how Attack Flow and Flow Builder can facilitate simulating attacks to test controls. (Under Construction)
  • Data Sharing - Learn how to use Attack Flow and Flow Manager to share path-based security data. (Under Construction)
  • detection - Learn how Attack Flow and Flow Builder can improve detection signatures. (Under Construction)
  • Digital Forensics and Incident Response - Attack Flow and Flow Manager can help organizations document their DFIR in a way that facilitates finding additional useful information and gaining long-term insights. (Under Construction)
  • Executive Communication - Attack Flow and Flow Manager can help improve executive communication in a way thats tracable to tactical detail. (Under Construction)
  • Red Teaming - Learn how to use Attack Flow and Flow Builder to define scope before tests and document the results after. (Under Construction)
  • Risk Assessment - Attack Flow and Flow Manager provide new risk assessment tools that are simply unavailable without graphs. (Under Construction)
  • Threat Intelligence - Learn how Attack Flow and Flow Manager can help structure threat intelligence beyond simple Indicators of Compromise (IOCs). (Under Construction)

Attack Simulation

How to use Attack Flow and Flow Manager for attack simulation.

Data Sharing

How to use Flow Manager and Attack Flow for cyber security data sharing.

Detection

How to use Flow Manager and Attack Flow for detecting attacks.

DFIR

How to use Attack Flow and Flow Manager for Digital Forensics and Incident Response.

Executive Communication

How to use Flow Manager and Attack Flow to communicate with senior leadership.

Red Teaming

How to use Attack Flow and Flow Manager to plan and document Red Teams and Penetration Tests.

Risk Assessment

How to use Attack Flow and Flow Manager to analyze your security risks holistically.

Security Engineering

How to use Attack Flow and Flow Manager to analyze your attack surface and plan your mitigations.

Threat Intelligence

How to use Attack Flow and Flow Manager to store and utilize your threat intelligence..


Last modified December 8, 2022: adding documentation (08105b6)