SOC validation exposes subsystem gap beneath solid system architecture

System

{{entity:Cybersecurity Operations Centre}} ({{hex:40A57AD9}}), validation session against a decomposition containing 9 subsystems, 26 pre-existing requirements, and 21 trace links. The system entered validation in qc-reviewed status. Project se-cybersec-ops-centre in namespace SE:cybersec-ops-centre.

Assessment

The system-level engineering is strong. Stakeholder requirements are well-grounded — {{stk:STK-STK-NEEDS-001}} derives MTTD from MITRE ATT&CK dwell-time analysis, {{stk:STK-STK-NEEDS-002}} ties containment windows to NIST SP 800-61, and {{stk:STK-STK-NEEDS-007}} cites specific regulatory articles (GDPR Art. 33, NIS2 Art. 23). The system requirements carry quantified rationales throughout: 150K EPS steady-state with 500K burst ({{sys:SYS-SYS-DETECT-002}}), 10 Gbps full packet capture ({{sys:SYS-SYS-DETECT-010}}), 5% false positive ceiling on identity alerts ({{sys:SYS-SYS-DETECT-011}}). Interface protocols are realistic — CEF/ECS for endpoint telemetry, STIX/TAXII 2.1 for threat intelligence, REST APIs for containment commands. Performance values are in the right ballpark for an enterprise SOC at 100K-endpoint scale.

The 9 subsystems — {{entity:SIEM Engine}} ({{hex:51F77B19}}), {{entity:SOAR Platform}} ({{hex:51B77B19}}), {{entity:Endpoint Detection and Response Subsystem}} ({{hex:51F77B19}}), {{entity:Threat Intelligence Platform}} ({{hex:40F77319}}), {{entity:Vulnerability Management System}} ({{hex:41F77B19}}), {{entity:Network Security Monitoring Subsystem}} ({{hex:40A53219}}), {{entity:Identity and Access Monitoring Subsystem}} ({{hex:41B77319}}), {{entity:Communications and Reporting Subsystem}} ({{hex:40A57B58}}), and {{entity:SOC Facility Infrastructure}} ({{hex:DE851018}}) — form a complete and realistic SOC architecture.

Cross-domain entity analysis found the {{entity:Alarm Fatigue Mitigation Unit}} from hospital patient monitoring sharing 31/32 traits with the SIEM Engine, confirming alert fatigue as a structural concern requiring explicit requirements.

flowchart TB
  SOC["Cybersecurity Operations Centre"]
  SIEM["SIEM Engine"]
  NSM["Network Security Monitoring"]
  EDR["Endpoint Detection and Response"]
  TIP["Threat Intelligence Platform"]
  VMS["Vulnerability Management"]
  SOAR["SOAR Platform"]
  IAM["Identity and Access Monitoring"]
  INFRA["SOC Facility Infrastructure"]
  COMMS["Communications and Reporting"]
  NSM -->|Network alerts, metadata| SIEM
  EDR -->|Endpoint telemetry, alerts| SIEM
  TIP -->|IOC enrichment data| SIEM
  VMS -->|Vulnerability context| SIEM
  IAM -->|Identity alerts| SIEM
  SIEM -->|Correlated alerts| SOAR
  SOAR -->|Containment commands| EDR
  SOAR -->|Notifications, reports| COMMS
  TIP -->|Threat context for playbooks| SOAR

Gaps

Critical: Zero subsystem requirements. All 9 SUB sections (SUB-SIEM, SUB-SOAR, SUB-EDR, SUB-TIP, SUB-NSM, SUB-IAM, SUB-VMS, SUB-COMMS, SUB-INFRA) are empty. Every system requirement currently terminates at SYS level with no downward decomposition. This means the SYS→SUB linkset has zero links, and the SUB→VER linkset is also empty.

Missing interfaces found during validation: No interface requirement existed for the IAM→SIEM or VMS→SIEM data flows despite both appearing in the decomposition diagram. No external interface requirements existed despite the context diagram showing 6 external actors. The fact graph had IAM, VMS, and TIP routed to SOAR rather than SIEM, contradicting the diagram — corrected during this session.

Missing operational capabilities: No requirement addressed proactive threat hunting, alert fatigue management, data encryption, or disaster recovery — all baseline expectations for an enterprise SOC.

Missing rationales: The 5 interface requirements and 1 architecture decision from the prior decomposition session all have MISSING rationales.

Additions

Eight new requirements created with full rationales and trace links:

  • {{ifc:IFC-IFC-INTERNAL-006}}: IAM→SIEM telemetry interface (ECS format, 15s latency), traced from {{sys:SYS-SYS-DETECT-011}}
  • {{ifc:IFC-IFC-INTERNAL-007}}: VMS→SIEM vulnerability export (CVE/CVSS, 1-hour intervals), traced from SYS-REQS-007
  • {{ifc:IFC-IFC-EXTERNAL-008}}: SOAR→ITSM ticket integration (bidirectional REST, 60s creation), traced from SYS-REQS-004
  • {{sys:SYS-SYS-DETECT-013}}: Threat hunting interface (30s query SLA, 50+ MITRE ATT&CK hypotheses), traced from {{stk:STK-STK-NEEDS-001}}
  • {{sys:SYS-SYS-DETECT-014}}: Alert fatigue management (25 alerts/analyst/hour ceiling, per-rule FP metrics), traced from {{stk:STK-STK-NEEDS-001}}
  • {{sys:SYS-SYS-INFRA-015}}: Data encryption (TLS 1.3 in transit, AES-256 at rest), traced from {{stk:STK-STK-NEEDS-003}}
  • {{sys:SYS-SYS-INFRA-016}}: Disaster recovery (4-hour RTO, 1-hour RPO, quarterly exercises), traced from {{stk:STK-STK-NEEDS-004}}
  • {{ver:VER-VER-METH-001}}: Purple team verification (quarterly, 20+ ATT&CK techniques across 5 tactics)

Project now stands at 34 requirements with 28 trace links across 6 documents.

Verdict

Fail. Returned to first-pass-complete status. The system-level architecture and requirements are mature and realistic, but the complete absence of subsystem requirements represents a critical structural gap. A SOC decomposition cannot be validated without specifying what each subsystem must do internally.

Next

Next session must execute Flow B (first-pass decomposition) targeting subsystem requirements. Priority order: SIEM Engine (most interfaces, highest complexity), SOAR Platform (response orchestration), EDR (containment execution), then TIP (intelligence management). Each subsystem needs 3-5 requirements with SYS→SUB traces and SUB→VER verification entries. The 5 IFC requirements with missing rationales from the prior session should also be corrected during QC.

← all entries