Detection rules tuned monthly
Demonstrate that security detection rules across monitoring platforms are systematically reviewed, tested, and adjusted on a monthly basis to maintain optimal detection efficacy and acceptable false positive rates.
Description
What this control does
Detection rules tuned monthly refers to the systematic review, optimization, and adjustment of security event detection signatures, correlation rules, behavioral analytics thresholds, and threat hunting queries deployed in SIEM, EDR, NDR, and other security monitoring platforms. This process involves analyzing false positive rates, validating true positive detection accuracy, incorporating new threat intelligence, adjusting threshold values, and decommissioning obsolete rules based on environmental changes and emerging attack patterns. Monthly tuning ensures detection logic remains aligned with the current threat landscape, organizational risk profile, and operational context, preventing alert fatigue while maintaining detection efficacy.
Control objective
What auditing this proves
Demonstrate that security detection rules across monitoring platforms are systematically reviewed, tested, and adjusted on a monthly basis to maintain optimal detection efficacy and acceptable false positive rates.
Associated risks
Risks this control addresses
- Attackers exploit detection blind spots created by outdated rules that no longer match evolved tactics, techniques, and procedures (TTPs)
- Alert fatigue caused by excessive false positives leads security analysts to ignore or disable critical detection mechanisms
- New attack vectors and zero-day exploits remain undetected because detection logic has not incorporated recent threat intelligence
- Legitimate business process changes trigger persistent false alerts because rules were not updated to reflect environmental modifications
- Detection rules calibrated for previous infrastructure configurations fail to trigger on new cloud services, containers, or endpoints
- Performance degradation of security platforms occurs when inefficient or redundant rules accumulate without periodic optimization
- Compliance violations go undetected because regulatory-mandated detection controls drift from effectiveness over time
Testing procedure
How an auditor verifies this control
- Obtain the documented detection rule tuning policy or standard operating procedure that defines scope, frequency, roles, and methodology for monthly reviews
- Retrieve a complete inventory of active detection rules across all in-scope security monitoring platforms (SIEM, EDR, NDR, CASB) including rule identifiers, descriptions, creation dates, and last modification dates
- Select a representative sample period covering the most recent three months and obtain tuning activity records including meeting minutes, tuning tickets, change requests, or documented review sessions for each month
- Review evidence of rule performance analysis for the sample period including false positive rates, true positive counts, rule trigger frequency, and analyst feedback or escalation patterns
- Examine change control records documenting specific rule modifications made during the sample period including threshold adjustments, logic changes, rule additions, and rule deprecations with associated justifications
- Interview the security operations manager or detection engineering lead to verify the tuning process execution, stakeholder involvement, threat intelligence incorporation methods, and handling of environmental changes
- Test a sample of recently modified rules by reviewing before-and-after configurations, validation test results, and documented rationale for changes
- Verify that tuning activities incorporate external threat intelligence feeds, vulnerability disclosures, incident lessons learned, and pen test or red team findings from the corresponding period
Where this control is tested