Published: 16 January 2018
Summary
Use cases are a core facet of security monitoring activities. A structured process to identify, prioritize, implement and maintain use cases allows technical professionals to align monitoring efforts to security strategy, choose best-fit solutions and maximize the value of security monitoring tools.
Included in Full Research
- Prework
- Identify Use-Case Candidates
- Threat-Oriented Use Cases
- Control-Oriented Use Cases
- Asset-Oriented Use Cases
- Identifying Candidates
- Popular Starter Use Cases
- Prioritize Use-Case Candidates
- Individual Use-Case Life Cycle
- Sprint of Use-Case Implementation
- Review Use-Case Results
- Tuning a Use Case
- Removing a Use Case
- Measure Process Performance