Skip to main content

Security Operations Center — unified threat detection, incident correlation, and response with TIBET audit trail

Project description

tibet-soc — Security Operations Center with TIBET Provenance

Unified threat detection, event correlation, and incident response for the TIBET ecosystem. Every SOC decision is recorded as a TIBET token — an audit trail for the auditor.

What It Does

tibet-soc is the central nervous system of TIBET security. It aggregates signals from every TIBET tool and correlates them into actionable alerts:

Source Signal Type
tibet-audit Compliance violations, policy
tibet-db Data access anomalies, tampering
tibet-edge Boundary crossings, perimeter
tibet-mirror Supply chain integrity failures
tibet-snap State deviations, rollback events
tibet-nis2 NIS2 compliance incidents
inject-bender Injection attacks, exploit probes

Event Correlation

Multiple low-severity events can indicate a high-severity attack:

  • Brute Force — 3+ auth failures from same source in 5 minutes
  • APT Attack — data breach combined with privilege escalation
  • Supply Chain Compromise — supply chain event from tibet-mirror
  • Insider Threat — anomaly + policy violation from same asset

Playbook-Driven Response

Automated response actions based on threat type:

  • isolate_asset — quarantine the compromised asset
  • snapshot_state — capture state via tibet-snap for forensics
  • block_source — block the offending source at the perimeter
  • notify_team — alert the security team
  • escalate_nis2 — trigger NIS2 incident reporting workflow

TIBET Provenance

Every SOC decision produces a TIBET token:

  • ERIN: event/alert/decision details
  • ERAAN: correlated events, source tools, jis: identity
  • EROMHEEN: SOC node, analyst, timestamp
  • ERACHTER: correlation pattern or playbook execution context

Installation

pip install tibet-soc

With optional integrations:

pip install tibet-soc[full]  # rich CLI + tibet-nis2/snap/db

CLI

tibet-soc info         # Concept overview
tibet-soc demo         # Full demo: ingest, correlate, detect, respond
tibet-soc playbooks    # List default playbooks
tibet-soc status       # SOC dashboard stats

Python API

from tibet_soc import SOCEngine, SecurityEvent, Playbook

# Create SOC engine
soc = SOCEngine()

# Ingest events from multiple sources
soc.ingest(SecurityEvent(
    source="inject-bender",
    severity="HIGH",
    event_type="intrusion",
    description="SQL injection attempt blocked",
    asset_id="web-server-01",
))

soc.ingest(SecurityEvent(
    source="tibet-db",
    severity="CRITICAL",
    event_type="data_breach",
    description="Unauthorized bulk data export",
    asset_id="db-primary",
))

# Correlate events and detect patterns
alerts = soc.correlate()
for alert in alerts:
    print(f"[{alert.severity}] {alert.title}")

# Execute playbook for alert
soc.execute_playbook(alerts[0])

# Dashboard stats
print(soc.stats())

License

MIT — Humotica / J. van de Meent

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

tibet_soc-0.1.0.tar.gz (13.1 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

tibet_soc-0.1.0-py3-none-any.whl (15.0 kB view details)

Uploaded Python 3

File details

Details for the file tibet_soc-0.1.0.tar.gz.

File metadata

  • Download URL: tibet_soc-0.1.0.tar.gz
  • Upload date:
  • Size: 13.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_soc-0.1.0.tar.gz
Algorithm Hash digest
SHA256 3586ece9da1036811b41d257a50ed990110aa6c51d34081957786c2b84ffe4ee
MD5 d84b3e08952ed613ee55df480081b800
BLAKE2b-256 e25e94ea66209e5498999f351c70eeb84465d65955d68920b1efa4795a795edc

See more details on using hashes here.

File details

Details for the file tibet_soc-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: tibet_soc-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 15.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.5

File hashes

Hashes for tibet_soc-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 82fe841a1e65794c90373a624102e1a9808f6957b1c5291284b575fda1782641
MD5 97c41b43b8a8671bdf8b6c4fc822ff96
BLAKE2b-256 2d53f06da72e9ed482b6ea693fa600fe3b47a9a870865ba7cb30586eca42139c

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page