Security Operations Center — unified threat detection, incident correlation, and response with TIBET audit trail
Project description
tibet-soc — Security Operations Center with TIBET Provenance
Unified threat detection, event correlation, and incident response for the TIBET ecosystem. Every SOC decision is recorded as a TIBET token — an audit trail for the auditor.
What It Does
tibet-soc is the central nervous system of TIBET security. It aggregates signals from every TIBET tool and correlates them into actionable alerts:
| Source | Signal Type |
|---|---|
| tibet-audit | Compliance violations, policy |
| tibet-db | Data access anomalies, tampering |
| tibet-edge | Boundary crossings, perimeter |
| tibet-mirror | Supply chain integrity failures |
| tibet-snap | State deviations, rollback events |
| tibet-nis2 | NIS2 compliance incidents |
| inject-bender | Injection attacks, exploit probes |
Event Correlation
Multiple low-severity events can indicate a high-severity attack:
- Brute Force — 3+ auth failures from same source in 5 minutes
- APT Attack — data breach combined with privilege escalation
- Supply Chain Compromise — supply chain event from tibet-mirror
- Insider Threat — anomaly + policy violation from same asset
Playbook-Driven Response
Automated response actions based on threat type:
isolate_asset— quarantine the compromised assetsnapshot_state— capture state via tibet-snap for forensicsblock_source— block the offending source at the perimeternotify_team— alert the security teamescalate_nis2— trigger NIS2 incident reporting workflow
TIBET Provenance
Every SOC decision produces a TIBET token:
- ERIN: event/alert/decision details
- ERAAN: correlated events, source tools,
jis:identity - EROMHEEN: SOC node, analyst, timestamp
- ERACHTER: correlation pattern or playbook execution context
Installation
pip install tibet-soc
With optional integrations:
pip install tibet-soc[full] # rich CLI + tibet-nis2/snap/db
CLI
tibet-soc info # Concept overview
tibet-soc demo # Full demo: ingest, correlate, detect, respond
tibet-soc playbooks # List default playbooks
tibet-soc status # SOC dashboard stats
Python API
from tibet_soc import SOCEngine, SecurityEvent, Playbook
# Create SOC engine
soc = SOCEngine()
# Ingest events from multiple sources
soc.ingest(SecurityEvent(
source="inject-bender",
severity="HIGH",
event_type="intrusion",
description="SQL injection attempt blocked",
asset_id="web-server-01",
))
soc.ingest(SecurityEvent(
source="tibet-db",
severity="CRITICAL",
event_type="data_breach",
description="Unauthorized bulk data export",
asset_id="db-primary",
))
# Correlate events and detect patterns
alerts = soc.correlate()
for alert in alerts:
print(f"[{alert.severity}] {alert.title}")
# Execute playbook for alert
soc.execute_playbook(alerts[0])
# Dashboard stats
print(soc.stats())
License
MIT — Humotica / J. van de Meent
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file tibet_soc-0.1.0.tar.gz.
File metadata
- Download URL: tibet_soc-0.1.0.tar.gz
- Upload date:
- Size: 13.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3586ece9da1036811b41d257a50ed990110aa6c51d34081957786c2b84ffe4ee
|
|
| MD5 |
d84b3e08952ed613ee55df480081b800
|
|
| BLAKE2b-256 |
e25e94ea66209e5498999f351c70eeb84465d65955d68920b1efa4795a795edc
|
File details
Details for the file tibet_soc-0.1.0-py3-none-any.whl.
File metadata
- Download URL: tibet_soc-0.1.0-py3-none-any.whl
- Upload date:
- Size: 15.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.5
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
82fe841a1e65794c90373a624102e1a9808f6957b1c5291284b575fda1782641
|
|
| MD5 |
97c41b43b8a8671bdf8b6c4fc822ff96
|
|
| BLAKE2b-256 |
2d53f06da72e9ed482b6ea693fa600fe3b47a9a870865ba7cb30586eca42139c
|