I wrote some words on how detection teams can push portions of their threat intel matching into ETL pipelines as they ingest data.
https://shellcromancer.io/posts/threat-intel-in-your-etl/
This pushes towards to goal of keeping logic inside of SIEMs simple enough to understand in a 60 seconds, maximally decorating events at ingest time, and optimizing for cost.
TI in your ETL :: Shellcromancer
Mature Security Operations (SecOps) programs have a good handle on ingesting the right security telemetry for their organization and make good use of it in threat detection and incident response processes. As these SecOps teams mature their use of telemetry, a common project is surfacing externally known threats that are present in their environment by matching on Indicators of Compromise (IOCs). Common types of IOCs are IP addresses, file hash values, domains, and URLs.




