Skip to content

Latest commit

Β 

History

History
327 lines (252 loc) Β· 16.2 KB

File metadata and controls

327 lines (252 loc) Β· 16.2 KB

πŸ“‹ Planning Phase

🎯 This phase defines the why, when, who & what needs to be in place to commence the development of the use case.

πŸ” Overview

The planning phase in detection engineering is a crucial step that sets the foundation for the development and implementation of effective use cases. This phase involves defining the why, when, who, and what aspects necessary to commence the development process. By taking a top-down approach, organizations can gain a comprehensive understanding of the big picture and all its components, leading to more informed decision-making and improved outcomes.

πŸ“ˆ Benefits of Top-Down Planning

flowchart LR
    A[🎯 Top-Down Planning] --> B[πŸ“‰ Decreased Risk]
    A --> C[πŸŽͺ Organization Goals]
    A --> D[⚑ Faster Change Management]
    A --> E[⏰ Minimized Time Costs]
    A --> F[πŸ”§ Reduced Errors]
    
    style A fill:#2C3E50,stroke:#85C1E9,stroke-width:2px,color:#FFFFFF
    style B fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style C fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style D fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style E fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style F fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
Loading

🎯 Key Advantages

πŸ”» Decreased Risk in Decision-Making

  • By starting with a holistic view of the organization's security requirements and objectives, potential risks and challenges can be identified early on
  • This allows for more informed choices regarding the selection of use cases, technologies, and resources required for implementation

🏒 Organization-wide Goals

  • By involving stakeholders from different departments and levels of the organization, a shared understanding of security priorities and objectives can be established
  • This alignment ensures that the development efforts are focused on addressing the most critical security needs and supporting the overall business strategy

πŸš€ Faster Change Management

  • By considering the impact of new use cases on existing systems, processes, and workflows, organizations can proactively identify potential conflicts or dependencies
  • This enables them to develop strategies to minimize disruption and optimize the integration of new detection capabilities into the existing security infrastructure

⏱️ Minimized Time Costs

  • By investing time upfront to define requirements, gather input from stakeholders, and create a clear roadmap, organizations can streamline the development process
  • This reduces the likelihood of delays, rework, or unnecessary iterations during the implementation phase

πŸ› οΈ Error Minimization

  • By taking a systematic and structured approach, organizations can identify potential pitfalls, dependencies, and challenges early on
  • This allows for better risk mitigation strategies and the implementation of robust quality assurance measures

πŸ“ Use Case Development Requirements

To successfully develop and onboard new use cases, specific elements of the use case need to be made concrete:

flowchart TD
    A[πŸ“‹ Use Case Requirements] --> B[🎯 Clear Scope & Objectives]
    A --> C[πŸ‘₯ Stakeholder Involvement]
    A --> D[πŸ“„ Documentation]
    A --> E[πŸ“Š Development Plan]
    A --> F[❓ High-level Needs Analysis]
    A --> G[πŸ” Contextual Feasibility]
    
    style A fill:#B7472A,stroke:#E67E22,stroke-width:2px,color:#FFFFFF
    style B fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style C fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style D fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style E fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style F fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style G fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
Loading

πŸ“‹ Essential Elements

  • 🎯 Scope & Objectives: Clearly defining the scope, objectives, and expected outcomes of the use case
  • πŸ‘₯ Stakeholder Input: Stakeholders who provide input into the use case development process should be actively involved to ensure proper alignment with their needs and requirements
  • πŸ“„ Documentation: The use case request should be documented to serve as a crucial reference point throughout the development and implementation process
  • πŸ“Š Development Plan: Developing a plan is essential to guide the use case development process, outlining steps, milestones, and resources needed
  • ❓ High-level Needs: Determined through formulating questions that channel the need for information into discrete requirements for developing the logic or detection capabilities
  • πŸ” Contextual Feasibility: Analysis conducted to ensure that the use case aligns with the business objectives and requirements

πŸ”¬ Contextual Feasibility Analysis

⚠️ Without the planning phase the development of the use cases could be delayed, inaccurate and could cause extended amount of confusion during the development phase.

It is important to understand the organisation's drivers or context behind the need for the use case as much as when the use cases are needed by and what resources would it need to build the use case. Such feasibility exercise is usually gathered in the form of an internal form which is then kept on record for historical record keeping and traceability purposes.

πŸ“Š Components Analysis

mindmap
  root((πŸ”¬ Contextual<br/>Feasibility<br/>Analysis))
    🎯 Objective
      Technical Goals
      Organizational Goals
    πŸš— Drivers
      Motivations
      Context
    πŸŽͺ Scope
      Assets
      Systems
      Data
    πŸ’‘ Purpose
      Value Description
      Justification
    πŸ’Ž Value
      Impact Assessment
      Asset Priority
    ⚑ Priority
      Urgency
      Timeframe
    πŸ‘₯ Stakeholders
      Departments
      Interest Groups
    🀝 Alignment
      Organization-wide
      Process Integration
    πŸ“ˆ Outputs
      Metrics
      Deliverables
    πŸ› οΈ Resourcing
      Personnel
      Tools
      Technologies
    πŸ“‹ Backlog
      Prioritized List
      Strategic Planning
Loading

πŸ“‹ Component Details

🎯 Objective

Clearly defining the technical and organizational objectives of the use case

Without well-defined objectives, the use case may lack focus and fail to address the organization's specific security needs. It is akin to embarking on a journey without a destination in mind. Without clear objectives, the development team may wander aimlessly, resulting in wasted time and resources, and potentially missing critical security threats.

πŸš— Drivers

Identifying the reasons and motivations behind developing the use case

This helps provide context and ensure alignment with the organization's goals and priorities. Without a clear understanding of the drivers, the use case may not effectively address the organization's security challenges. An analogy could be driving a car without knowing the destination or purpose.

πŸŽͺ Scope

Defining the assets (systems, data, applications, people, etc.) that need to be protected

This is crucial for focusing development efforts and ensuring comprehensive coverage. Without a well-defined scope, the use case may either overlook critical assets or try to protect too many irrelevant elements. Imagine building a fence around a property without defining its boundaries.

πŸ’‘ Purpose

Describing the scope and value of the use case

This helps establish its importance and justification. It provides a clear understanding of why the use case is needed and what benefits it brings to the organization. Without a clear purpose, the development team may struggle to prioritize the use case or communicate its value to stakeholders.

πŸ’Ž Value

Assessing the potential impacts of losing the identified assets or interrupting critical processes

This helps prioritize use cases based on their potential impact. Understanding the value of protecting these assets is crucial for making informed decisions about resource allocation and risk management. Without assessing value, the development team may invest resources in less critical use cases while neglecting higher-priority ones.

⚑ Priority

Determining the urgency and timeframe within which the use case needs to be developed

This ensures that critical security needs are addressed promptly. It helps prevent delays and ensures that the most pressing risks are mitigated in a timely manner. Without prioritization, the development team may focus on low-impact use cases while neglecting those with higher urgency.

πŸ‘₯ Stakeholders

Identifying the departments and stakeholders who have an interest in the use case

This is vital for gathering input, ensuring alignment, and fostering collaboration. Involving relevant stakeholders promotes a sense of ownership and helps capture diverse perspectives. Without stakeholder involvement, the use case may lack input from critical areas, resulting in a solution that fails to meet their needs or gain their support.

🀝 Alignment

Ensuring alignment with every relevant part of the organization

This helps minimize conflicts, streamline integration, and optimize effectiveness. It allows for the smooth coordination of security operations with other business processes and ensures that the use case does not inadvertently disrupt existing workflows or systems.

πŸ“ˆ Outputs

Defining the required outputs to measure and monitor the effectiveness of the use case

This is essential for evaluating its performance and making informed decisions. It helps establish metrics, alerts, reports, or other deliverables that provide insights into the use case's efficacy. Without clear outputs, it becomes challenging to assess the impact and value of the use case.

πŸ› οΈ Resourcing

Identifying the internal and extended resources required for the development phase

This ensures that the necessary personnel, tools, and technologies are available to successfully implement the use case. It helps allocate resources effectively, preventing resource shortages or inadequate support. Without proper resourcing, the development team may lack the necessary expertise, tools, or infrastructure.

πŸ“‹ Backlog

Maintaining a list of prioritized use cases that need to be developed

This allows for strategic planning and effective backlog management. It ensures that development efforts align with the organization's priorities and helps avoid ad-hoc decision-making or resource allocation. Without a backlog, the development team may struggle to prioritize and manage the development of multiple use cases.


πŸš€ Preparing for Development

The planning phase of detection engineering involves several crucial considerations to ensure a successful development process.

πŸ“Š Priority Management

flowchart TD
    A[πŸ“‹ Use Case Requests] --> B[πŸ“Š Score Assessment]
    B --> C[⚑ Urgency Score<br/>0-10]
    B --> D[🎯 Importance Score<br/>0-10]
    C --> E[βž• Sum Scores]
    D --> E
    E --> F[πŸ“ˆ Rank by Total Score]
    F --> G[πŸ† Highest Priority First]
    
    G --> H{Multiple High<br/>Priority Items?}
    H -->|Yes| I[βš–οΈ Order by<br/>Level of Effort]
    H -->|No| J[πŸš€ Begin Development]
    I --> J
    
    style A fill:#2C3E50,stroke:#85C1E9,stroke-width:2px,color:#FFFFFF
    style G fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style J fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style H fill:#B7472A,stroke:#E67E22,stroke-width:2px,color:#FFFFFF
    style B fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style C fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style D fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style E fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style F fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style I fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
Loading

🎯 Key Considerations

πŸ“Š Priority Determination

  • Not all use cases have the same level of urgency or importance
  • Some use cases may have impending deadlines, while others are critical to the organization's security posture or address imminent threats
  • Balancing urgency and importance is essential

πŸ“‹ Backlog Management

  • Maintain a use case development backlog that should be regularly reviewed
  • Each use case should be assigned scores for urgency and importance on a scale of 0 to 10
  • By summing up these scores, you can rank the use case requests and identify the ones with the highest priority
  • Begin development with the highest-scoring use cases and progressively move down the list
  • In cases where there are multiple urgent and important requests, order them based on the level of effort required

πŸ› οΈ Resource Planning

flowchart LR
    A[🏒 Internal Resources] --> D[🎯 Resource Pool]
    B[🌐 External Resources] --> D
    C[🀝 Alignment & Agreements] --> E[βœ… Ready for Development]
    D --> C
    
    A1[πŸ‘₯ SOC Team] --> A
    A2[πŸ’» IT Team] --> A
    A3[πŸ—οΈ Infrastructure] --> A
    A4[πŸ”’ Security Engineering] --> A
    A5[🌐 Networks] --> A
    
    B1[🏒 MSSPs] --> B
    B2[πŸ‘¨β€πŸ’Ό Contractors] --> B
    B3[πŸ›’ Use Case Marketplaces] --> B
    
    style D fill:#B7472A,stroke:#E67E22,stroke-width:2px,color:#FFFFFF
    style E fill:#1B4332,stroke:#27AE60,stroke-width:2px,color:#FFFFFF
    style A fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style B fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style C fill:#2C3E50,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style A1 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style A2 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style A3 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style A4 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style A5 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style B1 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style B2 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
    style B3 fill:#34495E,stroke:#85C1E9,stroke-width:1px,color:#FFFFFF
Loading

πŸ”§ Resource Identification

🏒 Internal Resources

  • SOC team or dedicated content development team as primary resources
  • Additional personnel from various domains:
    • πŸ’» IT: Infrastructure support
    • πŸ—οΈ Infrastructure: System maintenance
    • πŸ”’ Security Engineering: Technical expertise
    • 🌐 Networks: Connectivity and transport

🌐 External Resources

  • 🏒 Managed Security Service Providers (MSSPs): Professional services
  • πŸ‘¨β€πŸ’Ό Contractors: Specialized skills and temporary support
  • πŸ›’ Online use case marketplaces: Pre-built solutions and templates

🀝 Formal Alignment

  • Ensure identified resources are willing and formally aligned to participate
  • Establish through Operational Level Agreements (OLAs) or Service Level Agreements (SLAs)
  • Define expectations, responsibilities, and commitments of all parties involved
  • Formalize collaboration between teams and stakeholders
  • Establish clear communication channels, timelines, and deliverables

πŸ“‹ Example Process Steps for Planning Phase

flowchart TD
    A[Risk Drivers] --> D[Use Case Demand]
    B[Threat Drivers] --> D
    C[Compliance Drivers] --> D
    
    D --> E[Use case request]
    E --> F[Contextual Feasibility Analysis]
    F --> G[Stakeholder Discussion]
    
    E --> H{Request Validated}
    H -->|Yes| I[Prep for Dev backlog]
    H -->|No| J{Request revised}
    J -->|No| K[Park UC Request]
    J -->|Yes| E
    
    I --> L[UC Candidate Selection]
    L --> M[Resource Planning]
    M --> N[Resource Assignment]
    
    I --> O[UC technical feasibility Backlog]
    
    %% Styling for professional appearance
    classDef processBox fill:#E8F4FD,stroke:#2E86C1,stroke-width:2px,color:#1B4F72
    classDef decisionBox fill:#FDF2E9,stroke:#E67E22,stroke-width:2px,color:#A04000
    classDef endpointBox fill:#F4ECF7,stroke:#8E44AD,stroke-width:2px,color:#512E5F
    
    %% Apply classes
    class A,B,C,E,F,G,I,L,M,N processBox
    class H,J decisionBox
    class D,K,O endpointBox
Loading