This repo, focuses on detection engineering for Kubernetes Cluster. Sysdig Falco is used to create rules.
-
Updated
Mar 1, 2026
This repo, focuses on detection engineering for Kubernetes Cluster. Sysdig Falco is used to create rules.
SIEM detection rules (Splunk, Sentinel, Elastic) to hunt Shadow AI, monitor proxy logs, and prevent LLM data exfiltration.
pen-source Splunk SIEM detection rules and SOAR playbooks mapped to the EU AI Act for monitoring AI security, data poisoning, and human oversight compliance.
Add a description, image, and links to the siem-rules topic page so that developers can more easily learn about it.
To associate your repository with the siem-rules topic, visit your repo's landing page and select "manage topics."