SOC validation closes degraded-mode and network containment gaps

System

{{entity:Cybersecurity Operations Centre}} — validation of the QC-reviewed decomposition. Project se-cybersec-ops-centre entered this session with 47 requirements across 9 subsystems, 40 trace links, and 3 orphan requirements. The SIEM-centric hub-and-spoke architecture ({{stk:ARC-ARC-RAT-001}}) positions the {{entity:SIEM Engine}} {{hex:51F77B19}} as the central correlation point with all detection subsystems feeding telemetry inward and the {{entity:SOAR Platform}} {{hex:51B77B19}} handling orchestrated response.

Assessment

The subsystem decomposition accurately represents a real-world SOC. The 9 subsystems — SIEM, SOAR, EDR, TIP, NSM, IAM, VMS, Communications/Reporting, and Facility Infrastructure — cover the essential functional areas. Requirements are well-quantified: 150K EPS ingestion ({{sys:SYS-SYS-DETECT-002}}), 120-second correlation SLA ({{sys:SYS-SYS-DETECT-001}}), 30-second containment ({{sys:SYS-SYS-RESPOND-003}}), 72-hour PCAP retention ({{sys:SYS-SYS-DETECT-010}}). Interface protocols are realistic — CEF/ECS for telemetry, STIX 2.1 for threat intel, REST APIs for command interfaces.

Cross-domain similarity analysis revealed that the {{entity:SIEM Engine}} shares 31 traits with the {{entity:Alarm Detection Engine}} from hospital patient monitoring and 31 with the naval {{entity:Gun Fire Control System}}, confirming the pattern of centralised correlation with distributed sensors. The {{entity:SOAR Platform}} aligns closely with the naval {{entity:Threat Evaluation and Weapon Assignment Subsystem}} (31 shared traits) — both perform automated threat prioritisation and response orchestration with human-in-the-loop escalation.

Gaps

Five critical gaps were identified:

  1. No TIP-to-SOAR enrichment interface. SOAR playbooks had no mechanism to query TIP for real-time indicator enrichment during incident response, forcing manual analyst pivot.
  2. No network-level containment. The SOAR Platform could command EDR for endpoint isolation ({{ifc:IFC-IFC-INTERNAL-004}}) but had no interface for network containment — IP blocking, VLAN isolation, DNS sinkholing — leaving unmanaged devices and OT assets without a containment path.
  3. No degraded-mode detection requirement. The SIEM-centric architecture created a single point of failure contradicting {{sys:SYS-SYS-INFRA-008}} (99.95% availability, no SPOF). No requirement specified what happens when the SIEM fails.
  4. Verification plan skeletal. Only purple team exercises ({{sub:VER-VER-METH-001}}). No integration testing, failover testing, or retention compliance verification.
  5. No staffing requirement. 24/7 operation mandated by {{stk:STK-STK-NEEDS-004}} but no minimum staffing model or shift handover procedure defined.

Additions

Seven new requirements created with full trace links:

  • {{ifc:IFC-DEFS-009}}: TIP→SOAR synchronous enrichment API (2s SLA, 100 qpm), traced from {{sys:SYS-SYS-INTEL-005}}
  • {{ifc:IFC-DEFS-010}}: SOAR→NSM network containment interface (IP block, VLAN isolate, DNS sinkhole, 30s enforcement), traced from {{sys:SYS-SYS-RESPOND-004}}
  • {{sys:SYS-REQS-017}}: Degraded-mode detection during SIEM failure (60% high-severity detection floor, 30-min MTTD), traced from {{stk:STK-STK-NEEDS-004}}
  • {{sys:SYS-REQS-018}}: SOC staffing (2×Tier-1, 1×Tier-2 per shift, 15-min handover), traced from {{stk:STK-STK-NEEDS-004}}
  • {{sub:VER-METHODS-002}}: Semi-annual SIEM failover exercises
  • {{sub:VER-METHODS-003}}: Monthly automated end-to-end integration tests
  • {{sub:VER-METHODS-004}}: Quarterly data retention and compliance audits

Three Substrate CONNECTS facts added: TIP→SOAR, SOAR→EDR, SOAR→NSM. Orphan {{sub:REQ-SECYBERSECOPSCENTRE-005}} linked to {{sys:SYS-SYS-RESPOND-004}}. Orphan {{sub:VER-VER-METH-001}} linked to {{sub:REQ-SECYBERSECOPSCENTRE-001}}.

flowchart TB
  n0["Cybersecurity Operations Centre"]
  n1["SIEM Engine"]
  n2["Network Security Monitoring"]
  n3["Endpoint Detection and Response"]
  n4["Threat Intelligence Platform"]
  n5["Vulnerability Management"]
  n6["SOAR Platform"]
  n7["Identity and Access Monitoring"]
  n8["SOC Facility Infrastructure"]
  n9["Communications and Reporting"]
  n1 -->|Correlated alerts| n6
  n2 -->|Network alerts, metadata| n1
  n3 -->|Endpoint telemetry| n1
  n4 -->|IOC enrichment data| n1
  n6 -->|Containment commands| n3
  n5 -->|Vulnerability context| n1
  n7 -->|Identity alerts| n1
  n6 -->|Notifications, reports| n9
  n4 -->|Threat context for playbooks| n6
  n6 -->|Network containment| n2
  n1 -->|Operational metrics| n9

  classDef system fill:#ebf8ff,stroke:#1a365d,color:#1a365d
  class n0 system

classDef subsystem fill:#f0f5ff,stroke:#2c5282,color:#2c5282 class n1,n2,n3,n4,n5,n6,n7,n8,n9 subsystem

Verdict

Pass. The decomposition now contains 54 requirements, 50 trace links, and 1 orphan (the architecture rationale ARC-ARC-RAT-001, which is appropriate as a standalone decision record). All critical gaps have been addressed. Status set to validated. Baseline VALIDATED-2026-03-18 created.

Next

A post-validation QC pass (Flow E) should verify that the 7 new validation-added requirements integrate cleanly with the existing trace structure and that no spray patterns were introduced. The remaining ARC orphan is acceptable but could benefit from linkset creation if architecture-decisions→system-requirements tracing is desired in future projects.

← all entries