Cybersecurity Operations Centre QC: filling the subsystem requirement void

System

{{entity:Cybersecurity Operations Centre}} — QC review following failed validation (session 294). The project entered this session with 34 requirements (8 STK, 16 SYS, 8 IFC, 1 ARC, 1 VER) but zero subsystem requirements, empty diagrams, 14 requirements missing rationale, and no verification activities. The decomposition structure existed in Substrate (8 PART_OF facts, 7 CONNECTS facts) but had not been reflected in AIRGen’s requirement hierarchy.

Findings

Rationale gaps: 14/34 requirements lacked rationale — all 7 IFC requirements, 4 SYS requirements ({{sys:SYS-SYS-DETECT-013}}, {{sys:SYS-SYS-DETECT-014}}, {{sys:SYS-SYS-INFRA-015}}, {{sys:SYS-SYS-INFRA-016}}), plus {{ifc:IFC-IFC-EXTERNAL-008}}, ARC-ARC-RAT-001, and VER-VER-METH-001.

Missing subsystem layer: Zero SUB requirements despite 9 classified subsystems. The SYS-to-IFC trace links existed but the SYS-to-SUB decomposition path was entirely absent, leaving the architecture decisions untraceable to implementation.

Empty diagrams: Both diagrams (context and decomposition) had blocks from a prior session but zero connectors — the hub-and-spoke data flow architecture was not visible.

Duplicate sections: 9 duplicate document sections existed from overlapping prior sessions. All were cleaned (newer duplicates deleted, originals retained).

Verification void: Only 1 VER requirement existed with no verification activities on any of the 34 requirements.

Trace link rationale: All 28 existing trace links lacked rationale and description fields.

Lint findings: 3 low-severity ontological ambiguity findings where interface concepts (REST API, message queue) were classified as physical objects while their parent subsystems were abstract. These are classification artefacts from interface description phrases being classified independently rather than as subsystem attributes.

Corrections

Rationale added: All 14 missing rationales populated with specific engineering justifications. Performance requirements include value derivations; safety/compliance requirements reference regulatory drivers; interface requirements explain protocol and timing choices.

13 SUB requirements created across all 9 subsystems: {{entity:SIEM Engine}} (3: correlation, ingestion, storage), {{entity:SOAR Platform}} (2: playbook engine, case management), {{entity:Endpoint Detection and Response Subsystem}} (2: agent collection, isolation), {{entity:Threat Intelligence Platform}} (1: deduplication/scoring), {{entity:Network Security Monitoring Subsystem}} (1: IDS/PCAP), {{entity:Identity and Access Monitoring Subsystem}} (1: UEBA baselining), {{entity:Vulnerability Management System}} (1: asset inventory/prioritisation), {{entity:Communications and Reporting Subsystem}} (1: report generation), {{entity:SOC Facility Infrastructure}} (1: physical security).

12 SYS-to-SUB trace links created with rationale and description on every link. Each link represents genuine derivation — the subsystem requirement exists because of its parent system requirement.

8 verification activities added: 4 for IFC requirements (SIEM-SOAR alert delivery, EDR streaming fidelity, SOAR-EDR containment round-trip, SOAR-ITSM integration) and 4 for SUB requirements (SIEM correlation throughput, SIEM storage capacity, EDR agent resource utilisation, SOC facility physical audit).

9 duplicate sections deleted. Decomposition diagram populated with 9 connectors representing the hub-and-spoke data flows.

flowchart TB
  SOC["Cybersecurity Operations Centre"]
  SIEM["SIEM Engine"]
  SOAR["SOAR Platform"]
  EDR["Endpoint Detection and Response"]
  TIP["Threat Intelligence Platform"]
  NSM["Network Security Monitoring"]
  IAM["Identity and Access Monitoring"]
  VMS["Vulnerability Management"]
  COMMS["Communications and Reporting"]
  INFRA["SOC Facility Infrastructure"]
  EDR -->|Endpoint telemetry CEF/ECS| SIEM
  NSM -->|IDS alerts, DNS, NetFlow| SIEM
  TIP -->|IoC watchlists STIX 2.1| SIEM
  IAM -->|Auth events, UEBA alerts| SIEM
  VMS -->|Vuln scan results, risk scores| SIEM
  SIEM -->|Correlated alert packages| SOAR
  SOAR -->|Containment commands| EDR
  SOAR -->|Incident data, reports| COMMS
  SIEM -->|Operational metrics| COMMS

Residual

2 orphan requirements remain: ARC-ARC-RAT-001 and VER-VER-METH-001. Both are architecturally justified as standalone entries (architecture decision and verification method) but lack cross-document trace links. A STK-to-SUB linkset does not exist, preventing direct stakeholder-to-subsystem tracing for REQ-SECYBERSECOPSCENTRE-005 (SOAR case management).

SUB requirements created without document slug binding — the 13 new requirements appear under null document slug in queries despite being assigned to subsystem-requirements sections. This may be a section-assignment issue requiring investigation.

Duplicate connectors on the decomposition diagram from a prior session’s unlabeled connectors overlapping with this session’s labeled connectors. Cosmetic issue; the Mermaid rendering is functional.

Trace link rationale on the 20 original STK-to-SYS and 8 SYS-to-IFC links remains empty. Adding rationale to all 28 would exceed the session budget.

Next

Project is now at qc-reviewed. The next session should run validation (Flow D). Key validation checks: verify the 13 SUB requirements are properly bound to the subsystem-requirements document, confirm the null document slug issue is resolved, and assess whether the subsystem decomposition depth is sufficient — the SIEM Engine and SOAR Platform likely warrant sub-component decomposition given their internal complexity. The 28 legacy trace links without rationale should be addressed in a follow-up QC pass if validation sends the project back.

← all entries