Use Cases
Learn to make elaborate use cases for the security team to assist them in performing the relevant action when a threat is detected.
We'll cover the following
Generate requests for security teams
A security team may be approached by individuals or businesses asking them to provide security, such as monitoring a new application or system. This request could be driven by regulatory requirements that need to be met. However, simply requesting that security provide security monitoring is an inadequate request. This is known as throwing it over the fence, which means shifting the risk onto someone else. The security team probably knows very little about the new system or software and how to respond to many of its alerts. In other words, it’s not as simple as just asking them to monitor it.
Make use cases to assist security teams
More often than not, the security team isn’t the subject matter expert (SME) of systems and apps that live outside of security. To bridge this knowledge gap, use cases should be provided by the asset owner or the SME. Each use case is a document for each alert the system may generate and the corresponding response that should be taken. For example, it should indicate what to do if a certain alert is observed The table below is an example of a use case document.
Get hands-on with 1200+ tech skills courses.