Use-case engineering / detection coverage
Demonstrate that security monitoring capabilities are engineered through documented use cases that provide measurable detection coverage across relevant threat scenarios and adversary behaviors, with evidence of ongoing validation and gap remediation.
Description
What this control does
Use-case engineering and detection coverage is the systematic process of translating threat intelligence, adversary behaviors, and business-critical attack scenarios into specific detection logic within security monitoring tools (SIEM, EDR, NDR). Each use case defines what to detect, how to detect it, alert thresholds, and mapping to MITRE ATT&CK tactics and techniques. Mature programs maintain a use-case library with documented coverage across the cyber kill chain, regularly validated against emerging threats and tested through purple team exercises. This ensures the organization's detection capabilities are intentionally designed, measurable, and aligned to real adversary tradecraft rather than relying on default vendor signatures alone.
Control objective
What auditing this proves
Demonstrate that security monitoring capabilities are engineered through documented use cases that provide measurable detection coverage across relevant threat scenarios and adversary behaviors, with evidence of ongoing validation and gap remediation.
Associated risks
Risks this control addresses
- Adversaries successfully execute known attack techniques (e.g., credential dumping, lateral movement, data exfiltration) without triggering alerts due to detection blind spots
- Security operations teams respond reactively to vendor-provided signatures without tailoring detection logic to organization-specific threat landscape and critical assets
- Duplicate, conflicting, or poorly-tuned detection rules create alert fatigue, causing analysts to miss genuine compromise indicators amid false positives
- Detection gaps for MITRE ATT&CK techniques used by threat actors targeting the organization's industry vertical remain unknown until post-incident forensics
- Compliance-driven logging without corresponding detection use cases results in data collection without actionable threat identification capability
- Changes to infrastructure, cloud adoption, or business processes create new attack surfaces without corresponding updates to detection coverage
- Lack of use-case ownership, documentation, and maintenance leads to degraded detection effectiveness as tools and environments evolve
Testing procedure
How an auditor verifies this control
- Obtain the organization's use-case library or detection engineering documentation, including the inventory of all active detection rules across SIEM, EDR, NDR, and other monitoring platforms.
- Review the methodology for use-case development, including how threat intelligence, risk assessments, and MITRE ATT&CK framework inform prioritization and design of detection logic.
- Select a representative sample of 10-15 use cases spanning different kill-chain phases and select the corresponding detection rules in the SIEM or monitoring tool for detailed examination.
- Verify each sampled use case includes required elements: threat description, detection logic/query, data sources, MITRE ATT&CK technique mapping, alert severity, escalation procedure, and documented owner.
- Generate a MITRE ATT&CK heatmap or coverage matrix showing which techniques have detection coverage, identifying gaps in critical threat scenarios relevant to the organization's risk profile.
- Review evidence of use-case testing, including purple team exercise results, detection simulation outputs (e.g., Atomic Red Team, AttackIQ), or tabletop validation records from the past 12 months.
- Examine change management records showing how use cases are updated in response to new threats, infrastructure changes, false positive tuning, or post-incident lessons learned.
- Interview detection engineering or threat detection personnel to assess their understanding of coverage gaps, tuning processes, and how use-case effectiveness metrics inform prioritization decisions.
Where this control is tested