Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
10 sources · matching filters · sorted by citation density
Sort
ACybersecurity10 sources
01
CIS Controls v8Center for Internet Security

18 prioritized security controls organized into Implementation Groups (IG1, IG2, IG3). Practical and prescriptive — good for questions about prioritization and which controls matter most for different organization sizes.

Test your knowledge · A1
02

EU-focused annual threat assessment. Covers ransomware, supply chain, disinformation, state-sponsored threats. Useful counterpoint to US-centric sources.

Test your knowledge · A8
03

Seven phases from Reconnaissance to Actions on Objectives. Widely adopted but also widely critiqued (assumes perimeter-centric model). Good for compare/contrast with ATT&CK and Unified Kill Chain.

Test your knowledge · A8
04
Mandiant M-Trends ReportMandiant (Google Cloud)

Annual IR data: dwell time trends, initial access vectors, detection sources. Empirical data from thousands of engagements. One of the few sources for real-world detection/response metrics.

Test your knowledge · A7
05

Independent evaluations of security products against real-world attack scenarios. Good for questions about detection coverage, visibility gaps, and evaluation methodology.

Test your knowledge · A11
06

Guide to computer security log management. Covers log generation, storage, analysis, and the role of logs in incident response.

FrameworkFoundationalA10 · Security OperationsNEW · 1mo ago
Test your knowledge · A10
07

Based on real red/blue team assessments. Includes default configurations, improper privilege separation, lack of network segmentation. Excellent for practical scenario questions.

Test your knowledge · A2
08
Security OnionSecurity Onion Solutions

Free and open-source Linux distribution for threat hunting, enterprise security monitoring, and log management.

ToolIntermediateA10 · Security OperationsNEW · 1mo ago
Test your knowledge · A10
09

Annual SOC operations survey: alert volumes, MTTD/MTTR, staffing challenges, tool sprawl. Vendor but based on broad survey data across SOC teams.

GuideIntermediateA10 · Security OperationsNEW · 22d ago
Test your knowledge · A10
10

Annual analysis of real breach data. The gold standard for empirical questions about attack patterns, threat actor motivations, and time-to-detection. Updated annually.

Test your knowledge · A7

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.