← All reports
PDF Excel ReqIF

Cybersecurity Operations Centre

System Requirements Specification (SyRS) — ISO/IEC/IEEE 15289 — Specification | IEEE 29148 §6.2–6.4
Generated 2026-03-27 — UHT Journal / universalhex.org

Referenced Standards

StandardTitle
ISO 27001 Information security management systems — Requirements

Acronyms & Abbreviations

AcronymExpansion
ARC Architecture Decisions
CCCS Completeness, Consistency, Correctness, Stability
CEF Common Event Format
EARS Easy Approach to Requirements Syntax
ECS Elastic Common Schema
IFC Interface Requirements
STK Stakeholder Requirements
SUB Subsystem Requirements
SYS System Requirements
UHT Universal Hex Taxonomy
VER Verification Plan

Stakeholder Requirements (STK)

RefRequirementV&VTags
STK-STK-NEEDS-001 The Cybersecurity Operations Centre SHALL detect cyber threats targeting the organisation's IT and OT infrastructure with a mean time to detect (MTTD) not exceeding 15 minutes for high-severity incidents.
Rationale: MTTD of 15 minutes for high-severity incidents derives from MITRE ATT&CK dwell-time analysis: adversaries completing lateral movement within 30-60 minutes of initial compromise means detection must occur in the first half of that window to enable effective containment. Exceeding 15 minutes significantly increases the probability of privilege escalation and data exfiltration.
Test stakeholder, session-291
STK-STK-NEEDS-002 The Cybersecurity Operations Centre SHALL contain confirmed security incidents within 60 minutes of detection for critical-severity incidents and within 4 hours for high-severity incidents.
Rationale: Containment timelines of 60 minutes (critical) and 4 hours (high) are derived from the NIST SP 800-61 incident response lifecycle and align with insurance underwriter expectations. Critical incidents (ransomware, active intrusion) require sub-hour containment to prevent encryption propagation or data exfiltration at scale.
Test stakeholder, session-291
STK-STK-NEEDS-003 The Cybersecurity Operations Centre SHALL comply with NIST Cybersecurity Framework, ISO 27001, and all applicable sector-specific cyber security regulations in the jurisdictions where the organisation operates.
Rationale: Regulatory compliance is a non-negotiable operational requirement. NIST CSF provides the detection and response framework, ISO 27001 the management system baseline, and sector-specific regulations (e.g., NIS2 for critical infrastructure, PCI-DSS for payment processing) impose additional controls with legal penalties for non-compliance.
Inspection stakeholder, session-291
STK-STK-NEEDS-004 The Cybersecurity Operations Centre SHALL operate continuously 24 hours per day, 7 days per week, 365 days per year with no planned downtime exceeding 30 minutes per quarter.
Rationale: Cyber attacks are not bounded by business hours; adversaries deliberately operate during off-peak periods when monitoring attention is lowest. The 30-minute quarterly maintenance window constrains planned downtime to what can be achieved with rolling upgrades and hot-standby failover, maintaining continuous threat detection coverage.
Demonstration stakeholder, session-291
STK-STK-NEEDS-005 The Cybersecurity Operations Centre SHALL maintain visibility across all organisational IT assets, OT systems, cloud workloads, and remote access infrastructure, with no asset remaining unmonitored for more than 7 days after deployment.
Rationale: Unmonitored assets are the primary vector for undetected compromise. The 7-day onboarding window balances operational reality (new asset provisioning, network registration, agent deployment) against the risk window. Complete asset visibility is foundational — detection rules and vulnerability scans are ineffective against assets the SOC cannot see.
Inspection stakeholder, session-291
STK-STK-NEEDS-006 The Cybersecurity Operations Centre SHALL incorporate current cyber threat intelligence from at least 10 independent sources to inform detection rules, prioritise vulnerabilities, and contextualise alerts with threat actor attribution.
Rationale: Requiring 10+ independent intelligence sources ensures coverage diversity across commercial threat feeds (e.g., Recorded Future, Mandiant), open-source feeds (e.g., MISP communities, abuse.ch), government advisories (CISA, NCSC), and sector-specific ISACs. Single-source reliance creates blind spots for threats outside that vendor's collection aperture.
Inspection stakeholder, session-291
STK-STK-NEEDS-007 The Cybersecurity Operations Centre SHALL generate regulatory breach notifications within the timeframes mandated by applicable law, including GDPR 72-hour notification and NIS2 24-hour early warning, and SHALL produce executive incident summaries within 4 hours of incident declaration.
Rationale: GDPR Article 33 mandates 72-hour notification to supervisory authorities; NIS2 Article 23 requires 24-hour early warning. Failure to meet these timelines carries statutory penalties (up to 2% of global turnover under NIS2). The 4-hour executive summary enables incident commander decision-making during the critical early phase of response.
Demonstration stakeholder, session-291
STK-STK-NEEDS-008 The Cybersecurity Operations Centre SHALL support monitoring of up to 100,000 endpoints and 500 network segments without degradation in detection performance, and SHALL accommodate 25% annual growth in monitored assets without architectural redesign.
Rationale: 100,000 endpoints and 500 network segments represent a large enterprise baseline. The 25% annual growth accommodation prevents architectural redesign cycles that would introduce detection coverage gaps during migration. Without this headroom, SOC infrastructure becomes the bottleneck during acquisitions, cloud migrations, or rapid expansion.
Analysis stakeholder, session-291

System Requirements (SYS)

RefRequirementV&VTags
SYS-SYS-DETECT-001 The SIEM Engine SHALL correlate ingested security events against detection rules and produce alerts within 120 seconds of event ingestion for rule-based detections and within 300 seconds for behavioural anomaly detections.
Rationale: The 120-second rule-based and 300-second behavioural detection windows derive from the 15-minute MTTD stakeholder requirement (STK-NEEDS-001). Correlation must complete well within the MTTD budget to leave time for alert triage, enrichment, and analyst notification. Behavioural analytics require longer windows due to baseline comparison computation.
Test system, session-291
SYS-SYS-DETECT-002 The SIEM Engine SHALL sustain ingestion of at least 150,000 events per second at steady state and absorb bursts of up to 500,000 events per second for periods of up to 10 minutes without event loss or increased correlation latency.
Rationale: 150K EPS steady-state derives from 100K endpoints generating an average of 1.5 events/sec each across OS telemetry, EDR, network flow, and authentication logs. The 500K EPS burst capacity accommodates incident-triggered log surges (e.g., mass scanning, worm propagation) when event volumes spike 3-4x. Event loss during these bursts would create detection blind spots precisely when they are most dangerous.
Test system, session-291
SYS-SYS-DETECT-003 The Endpoint Detection and Response subsystem SHALL execute remote endpoint containment actions (network isolation, process termination) within 30 seconds of command issuance by the SOAR platform or analyst console.
Rationale: 30-second containment execution derives from the 60-minute critical incident containment target (STK-NEEDS-002). Automated containment actions (network isolation, process kill) must execute near-instantly once the decision is made, as each second of delay allows additional lateral movement, data staging, or encryption. The 30-second ceiling accounts for agent communication latency across WAN-connected endpoints.
Test system, session-291
SYS-SYS-DETECT-004 The SOAR Platform SHALL execute automated response playbooks for known alert categories within 60 seconds of alert receipt, and SHALL route alerts requiring human judgement to the appropriate analyst tier within 120 seconds.
Rationale: 60-second automated playbook execution for known alert types reduces analyst cognitive load and ensures consistent response for high-volume, well-understood threats (phishing, malware beaconing, brute-force). The 120-second routing SLA for human-judgement alerts ensures tier-appropriate analyst engagement before the MTTD budget is consumed.
Test system, session-291
SYS-SYS-DETECT-005 The Threat Intelligence Platform SHALL ingest and normalise indicators from at least 20 intelligence feeds using STIX/TAXII 2.1, with feed update intervals not exceeding 4 hours for commercial feeds and 1 hour for critical advisories.
Rationale: 20 feeds exceeds the 10-source stakeholder minimum (STK-NEEDS-006) to provide the TIP with sufficient indicator volume for cross-correlation. STIX/TAXII 2.1 is the OASIS standard for structured threat intelligence exchange, ensuring interoperability across commercial and government feeds. The 4-hour/1-hour update intervals balance API rate limits against indicator freshness for critical advisories (e.g., zero-day IOCs).
Test system, session-291
SYS-SYS-DETECT-006 The Cybersecurity Operations Centre SHALL retain searchable security event logs for a minimum of 90 days in hot storage and 365 days in warm storage, with archived logs retrievable within 4 hours for forensic investigation.
Rationale: 90-day hot storage enables immediate forensic investigation of incidents discovered during routine threat hunting or retrospective IOC matching. 365-day warm storage satisfies regulatory retention requirements (ISO 27001 A.12.4, PCI-DSS Requirement 10.7). The 4-hour retrieval SLA for archived logs supports investigation timelines without requiring cost-prohibitive all-hot architectures.
Test system, session-291
SYS-SYS-DETECT-007 The Vulnerability Management System SHALL scan 100% of IT assets on a rolling 7-day cycle and 100% of OT assets on a rolling 30-day cycle, maintaining a real-time asset inventory with accuracy of 98% or greater.
Rationale: 7-day IT scan cycle aligns with common vulnerability disclosure timelines and patch management SLAs. 30-day OT cycle reflects operational constraints — OT systems often cannot tolerate active scanning during production windows. 98% asset inventory accuracy ensures vulnerability coverage aligns with actual deployed infrastructure, preventing false confidence from scanning stale asset lists.
Test system, session-291
SYS-SYS-DETECT-008 The Cybersecurity Operations Centre platform SHALL achieve 99.95% availability measured monthly, with no single point of failure in the detection and alerting pipeline from event ingestion through analyst notification.
Rationale: 99.95% monthly availability allows approximately 22 minutes of unplanned downtime per month, consistent with Tier 3+ data centre SLAs and the 30-minute quarterly planned maintenance window (STK-NEEDS-004). The no-single-point-of-failure requirement ensures that component failure in the detection pipeline does not create an unmonitored window exploitable by adversaries.
Analysis system, session-291
SYS-SYS-DETECT-009 The Communications and Reporting Subsystem SHALL generate pre-populated regulatory breach notification documents within 30 minutes of incident classification, covering GDPR Article 33, NIS2 Directive Article 23, and applicable sector-specific templates.
Rationale: 30-minute notification document generation directly supports the GDPR 72-hour and NIS2 24-hour regulatory timelines (STK-NEEDS-007). Pre-populated templates eliminate the risk of incomplete mandatory fields under time pressure. GDPR Article 33, NIS2 Article 23, and sector templates must be maintained as living documents reflecting current regulatory interpretations.
Demonstration system, session-291
SYS-SYS-DETECT-010 The Network Security Monitoring Subsystem SHALL capture full packet data on all monitored network segments at aggregate throughput of 10 Gbps, retaining packet captures for a minimum of 72 hours, and SHALL process IDS signatures with update latency not exceeding 4 hours from rule publication.
Rationale: Full packet capture at 10 Gbps aggregate provides forensic evidence for incident investigation that metadata-only approaches cannot — payload inspection, protocol anomaly analysis, and malware sample extraction. 72-hour retention covers the typical investigation initiation window. 4-hour IDS rule update latency ensures signature coverage for newly disclosed vulnerabilities within the same operational cycle as vendor advisory publication.
Test system, session-291
SYS-SYS-DETECT-011 The Identity and Access Monitoring Subsystem SHALL perform User and Entity Behaviour Analytics across all Active Directory, Azure AD, and PAM authentication events, detecting credential compromise indicators with a false positive rate not exceeding 5% of total identity alerts.
Rationale: Identity is the primary attack surface in modern enterprise environments — over 80% of breaches involve credential compromise (Verizon DBIR). UEBA across AD, Azure AD, and PAM covers the full authentication surface. The 5% false positive ceiling ensures analyst trust in identity alerts; higher rates lead to alert fatigue and missed true positives in the identity domain.
Test system, session-291
SYS-SYS-DETECT-012 The SOC Facility Infrastructure SHALL provide uninterruptible power for a minimum of 72 hours using UPS and backup generators, maintain physical access control with two-factor authentication, and sustain operations during loss of primary commercial power or primary internet connectivity.
Rationale: 72-hour UPS/generator runtime covers extended utility outages during severe weather events or grid failures, maintaining SOC operations during the period when cyber threats may increase (adversaries exploit infrastructure disruptions). Two-factor physical access prevents unauthorised facility entry that could enable physical tampering with SOC infrastructure, keyboard loggers, or insider threat scenarios.
Demonstration system, session-291
SYS-SYS-DETECT-013 The SIEM Engine SHALL provide an interactive threat hunting interface supporting ad-hoc queries across all ingested telemetry with query response time not exceeding 30 seconds for searches spanning 7 days of data, and SHALL maintain a library of at least 50 reusable hunt hypotheses mapped to MITRE ATT&CK techniques.
Rationale: Threat hunting addresses the detection gap between known-bad indicators (covered by detection rules) and novel adversary TTPs. The 30-second query response time over 7-day windows ensures analysts can iterate on hunt hypotheses without workflow disruption. The 50-hypothesis library mapped to ATT&CK ensures coverage of common adversary technique chains even with analyst turnover.
Demonstration detection, validation, session-293
SYS-SYS-DETECT-014 The SIEM Engine SHALL implement alert suppression, deduplication, and correlation grouping to maintain a per-analyst alert volume not exceeding 25 actionable alerts per hour during steady-state operations, and SHALL provide tuning metrics showing false positive rates per detection rule category on a rolling 30-day basis.
Rationale: Without alert tuning, SOC analysts face alert fatigue that degrades detection effectiveness. The 25-alert/hour/analyst ceiling is derived from cognitive load research showing analyst accuracy drops below 80% above this threshold. Rolling 30-day false-positive metrics per rule category enable evidence-based tuning decisions and prevent regression when new detection rules are deployed.
Test detection, validation, session-293
SYS-SYS-DETECT-015 The Cybersecurity Operations Centre SHALL encrypt all security event data in transit using TLS 1.3 or later on all inter-subsystem and external communication channels, and SHALL encrypt data at rest using AES-256 or equivalent for all stored security events, threat intelligence, and incident case data.
Rationale: Security event data contains PII (usernames, IP addresses), threat intelligence under TLP restrictions, and forensic evidence with legal chain-of-custody requirements. TLS 1.3 is mandated over TLS 1.2 to eliminate known downgrade attacks against inter-subsystem channels that carry high-value telemetry. AES-256 at-rest encryption is required by ISO 27001 control A.10.1.1 and by GDPR Article 32 for processing security-relevant personal data.
Inspection infrastructure, validation, session-293
SYS-SYS-DETECT-016 The Cybersecurity Operations Centre SHALL maintain a documented disaster recovery capability with a recovery time objective of 4 hours and a recovery point objective of 1 hour for the detection and alerting pipeline, verified through quarterly DR exercises, and SHALL support geographic failover to an alternate facility.
Rationale: A SOC must remain operational during regional infrastructure failures (power outages, natural disasters, physical security incidents) because adversaries actively exploit degraded defensive posture. The 4-hour RTO ensures detection pipeline restoration before typical adversary dwell times allow lateral movement. The 1-hour RPO limits telemetry data loss to a window recoverable via endpoint log replay. Geographic failover is required because single-site SOCs are a single point of failure for the entire organisation's security posture.
Demonstration infrastructure, validation, session-293
SYS-SYS-DETECT-017 When the SIEM Engine becomes unavailable or operates at degraded capacity, the Cybersecurity Operations Centre SHALL maintain detection capability through direct alert forwarding from EDR, NSM, and IAM subsystems to the SOAR Platform, sustaining a minimum detection rate of 60% of high-severity alerts with mean time to detect not exceeding 30 minutes, until SIEM service is restored.
Rationale: The SIEM-centric hub-and-spoke architecture creates a single point of failure in the detection pipeline, contradicting the no-SPOF requirement (SYS-INFRA-008). Cross-domain analogs from nuclear reactor protection and naval combat management implement diverse detection paths to maintain safety-critical alerting during primary system failure. The 60% detection floor and 30-minute MTTD represent minimum acceptable degraded performance during SIEM outage.
Test degraded-mode, validation, session-297
SYS-SYS-DETECT-018 The Cybersecurity Operations Centre SHALL maintain a minimum staffing level of 2 Tier-1 analysts and 1 Tier-2 analyst per shift during 24/7 operations, with documented shift handover procedures including transfer of open incident context, pending playbook actions, and active threat hunt status, completed within 15 minutes of shift change.
Rationale: STK-NEEDS-004 mandates 24/7 continuous operation but no system-level requirement defines the staffing model. Industry standards (NIST SP 800-61, FIRST CSIRT frameworks) recommend minimum dual-analyst coverage for Tier-1 triage to avoid single-analyst fatigue-induced detection gaps during overnight shifts. The shift handover requirement prevents context loss between shifts, which is a known root cause of delayed incident escalation in SOC operations.
Inspection staffing, validation, session-297

Requirements by Category (IEEE 29148)

8
Functional Requirements
13
Performance Requirements
2
Interface Requirements
8
Security Requirements
3
Reliability & Availability
2
Compliance & Regulatory

Traceability Matrix — STK to SYS

SourceTargetTypeDescription
STK-NEEDS-004 SYS-REQS-018 derives Continuous operation stakeholder need to SOC staffing and shift handover
STK-NEEDS-004 SYS-REQS-017 derives Continuous operation stakeholder need to degraded-mode detection capability
STK-NEEDS-003 SYS-SYS-INFRA-015 derives
STK-NEEDS-004 SYS-SYS-INFRA-016 derives
STK-NEEDS-001 SYS-SYS-DETECT-014 derives
STK-NEEDS-001 SYS-SYS-DETECT-013 derives
STK-NEEDS-001 SYS-REQS-002 derives
STK-NEEDS-003 SYS-REQS-009 derives
STK-NEEDS-008 SYS-REQS-007 derives
STK-NEEDS-008 SYS-REQS-002 derives
STK-NEEDS-007 SYS-REQS-009 derives
STK-NEEDS-006 SYS-REQS-005 derives
STK-NEEDS-005 SYS-REQS-010 derives
STK-NEEDS-005 SYS-REQS-007 derives
STK-NEEDS-004 SYS-REQS-012 derives
STK-NEEDS-004 SYS-REQS-008 derives
STK-NEEDS-003 SYS-REQS-006 derives
STK-NEEDS-002 SYS-REQS-004 derives
STK-NEEDS-002 SYS-REQS-003 derives
STK-NEEDS-001 SYS-REQS-011 derives
STK-NEEDS-001 SYS-REQS-010 derives
STK-NEEDS-001 SYS-REQS-001 derives