SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe new Detection Engineering poster provides a practical roadmap for building, testing, and improving detections from logs to alerts.

Detection does not start with alerts. It starts with data. Logs, telemetry, and context flow in from countless systems, platforms, and services, often at a scale that can feel overwhelming. Security operations teams are expected to turn that raw data into meaningful alerts that identify real threats without burying analysts in noise. That challenge is at the heart of detection engineering.
Many teams struggle with the same realities. They collect large volumes of logs but lack clarity on what data truly matters. Alerts fire too often, or not often enough. Detections that worked well six months ago slowly lose value as environments and attacker behavior change. Without a clear structure, detection work can become reactive and inconsistent.
Detection engineering exists to bridge that gap. It brings discipline, intent, and repeatability to the process of turning data into alerts that analysts can trust. To help teams apply that discipline in a practical way, SANS is excited to release the Detection Engineering: From Logs to Alerts poster.
The Detection Engineering poster is designed to be a practical visual reference for anyone involved in building or using detections. The key difference is that this poster doesn’t teach a specific tool; it teaches how detection engineering works across tools. In production environments, where hybrid stacks are common, this portability is critical.
The goal of the poster is simple. It provides structure to detection engineering and SIEM operations that are often ad hoc. It creates a shared framework that SOC analysts, detection engineers, threat hunters, and incident responders can reference and discuss together. Most importantly, it helps teams think beyond individual rules and focus on the full detection process.
Whether you are reviewing existing detections, designing new ones, or trying to understand why alerts behave the way they do, the poster offers a single place to step back and see how the pieces fit together.
At the center of the poster is the Detection Engineering Life Cycle, which reinforces a critical idea: detections are not one-time creations. A rule written and deployed without follow-up will eventually become noisy, stale, or ineffective. Detection engineering is an ongoing process that evolves alongside environments and attacker behavior. The life cycle is broken into six essential phases:
Together, these phases emphasize that detections are living assets, continuously reviewed, improved, and adapted as both the environment and threat landscape evolve.
One of the most valuable aspects of the poster is its end-to-end view of how data flows from collection to alerting. Detection logic fails without reliable data upstream. For example, Event ID 4688 (process creation) is only useful if command-line logging is enabled through Group Policy. Without it, critical execution details remain invisible.
The poster walks through common log collection options, including agent based, agentless, API driven, and cloud native approaches. Each option comes with tradeoffs that affect visibility, performance, and maintenance. Understanding those tradeoffs helps teams make better decisions before detections are ever written.
From collection, the poster shows how logs move through aggregation and enrichment, where parsing, filtering, tagging, and threat intelligence context can dramatically improve detection quality. These steps often determine whether an alert provides meaningful insight or forces an analyst to start from scratch.
The poster also highlights key SIEM architecture considerations, such as event rates, storage performance, retention strategies, and scalability. These factors directly influence what data is available for detection and how quickly analysts can investigate alerts.
By presenting this full path visually, the poster helps teams see how early architectural decisions shape downstream detection outcomes. It encourages practitioners to think about data readiness and system design as foundational elements of detection engineering.
Detection engineering is as much about approach as it is about tooling. The poster includes a wide range of practical detection strategies that teams can apply and combine based on their environment and goals.
It highlights behavioral detections, which focus on attacker actions and sequences rather than specific indicators. These detections often require more effort to design but tend to be more durable over time. Statistical detections leverage baselines and patterns to identify deviations, while static detections provide faster, more tactical coverage for known threats.
The poster also covers common techniques such as allow lists, deny lists, anomaly detection, and long tail analysis. Each approach has strengths and weaknesses, and the poster emphasizes that no single technique is sufficient on its own. Effective detection programs blend multiple methods to balance coverage and noise.
For analysts and engineers, this section of the poster serves as a quick reference. It can help validate detection ideas, inspire new approaches, or provide language for discussing why a particular technique was chosen.
Rather than presenting idealized scenarios, the poster focuses on what works in production. It acknowledges constraints like limited data, noisy environments, and competing priorities. The result is a resource that feels practical because it is rooted in how detection engineering is actually practiced.
The poster is also intentionally tool-agnostic. Its concepts apply whether you are using a commercial SIEM, open source tooling, or cloud native security services. This makes it useful across teams with different stacks and maturity levels.
The Detection Engineering poster is designed for a broad range of security practitioners. SOC analysts can use it to better understand why alerts behave the way they do and how detections are built. Detection engineers and threat hunters can use it as a reference when designing and reviewing detection logic. Incident responders can use it to identify gaps and improvement opportunities after investigations.
Teams may find the poster useful as a desk side reference, as a shared visual during detection reviews, or as a training aid for onboarding new staff. It can also serve as a framework for conversations about detection maturity, SIEM architecture decisions, and cross-team collaboration.
Because it brings multiple perspectives into a single view, the poster helps create shared understanding across roles that often work in parallel but not always together.
The “Detection Engineering: From Logs to Alerts” poster is available now. Download your copy and start using it as a practical guide to building better detections grounded in data, attacker behavior, and real-world experience.
For those who want to explore these concepts in greater depth, SEC555: Detection Engineering and SIEM Analytics provides hands on instruction in detection engineering and SIEM architecture, building on the same principles presented in the poster.
Download the poster here.


Launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cybersecurity professionals with the practical skills and knowledge they need to make our world a safer place.
Read more about SANS Institute