Magma
Revised | Author | Comment |
---|---|---|
13.04.2025 | Roger Johnsen | Article added |
This article is a work in progress and please consider this as a sneak peak. Quality checks hasn’t been applied yet. If you find something off, please contact me directly.
Introduction
The MaGMa Use Case Framework (UCF) is a structured methodology for managing security monitoring scenarios within Security Operations Centers (SOCs). Developed collaboratively by the Dutch Financial Information Sharing and Analysis Community (FI-ISAC), MaGMa (Management, Growth, Metrics & Assessment) provides systematic documentation of detection use cases across three layers and four lifecycle phases.
Structured Approach to Use Case Management
SOCs typically manage dozens to hundreds of detection use cases, which often become disorganized. MaGMa addresses this by:
- Establishing traceability between business objectives and technical implementations
- Standardizing documentation through predefined templates
- Embedding metrics to measure framework maturity
- Supporting full lifecycle management
The Three-Layer Model
The MaGMa Use Case Framework is structured across three distinct but interconnected layers: Business, Threat, and Implementation. Each layer captures specific aspects of a use case, ensuring alignment from strategic objectives down to technical execution. The diagram below illustrates how information flows between these layers, with key elements represented at each level:
graph LR subgraph Business Layer A1[Purpose] A2[Drivers] A3[Stakeholders] A4[Output] end subgraph Threat Layer B1[ATT&CK Tactics] B2[Kill Chain Mapping] B3[Threat Actor Profiles] B4[Behavioral Indicators] end subgraph Implementation Layer C1[Data Sources] C2[Detection Logic] C3[Status] C4[Tuning Guidance] end A1 --> B1 A2 --> B2 A3 --> B3 A4 --> B4 B1 --> C1 B2 --> C2 B3 --> C3 B4 --> C4
1. Business Layer (Strategic)
Focuses on why the use case matters to the organization. It documents business objectives, compliance drivers, involved stakeholders, and the intended output (e.g., alerts, reports). Documents organizational relevance with:
What | Description |
---|---|
Purpose | Business value proposition (e.g., fraud prevention) |
Drivers | Compliance requirements (e.g., PCI DSS, GDPR) |
Stakeholders | Responsible business units |
Output | Expected deliverables (alerts, reports) |
2. Threat Layer (Tactical)
Bridges the gap between business intent and technical implementation. This layer maps the use case to threat intelligence elements such as MITRE ATT&CK techniques, adversary behaviors, and known threat actors. Aligns with adversary behaviors through:
What | Description |
---|---|
MITRE ATT&CK | techniques and tactics |
Kill Chain | positioning |
Threat Actor | profiles |
Behavioral Indicators | Specific TTP |
3. Implementation Layer (Operational)
Defines how the use case is executed on a technical level. It includes log source requirements, detection logic (queries/rules), development status, and tuning considerations. Details technical execution:
What | Description |
---|---|
Data Sources | Required logs (Windows Event IDs, EDR) |
Detection Logic | SIEM queries, correlation rules |
Status | Development stage (PoC → Production) |
Tuning Guidance | Known false positives |
Lifecycle Management
Effective use case management requires more than initial deployment—it demands continuous oversight. MaGMa structures this through a four-phase lifecycle model that ensures each use case remains relevant, actionable, and aligned with evolving threats and business needs. This lifecycle spans onboarding, daily operations, ongoing maintenance, and eventual retirement.
MaGMa formalizes four management phases:
flowchart LR Onboarding[Onboarding<br/>Define scope, requirements<br/>Business case, mapping] Operational[Operational<br/>Monitoring & triage<br/>Runbooks, escalations] Maintenance[Maintenance<br/>Adjust to changes<br/>Logs, test results] Offloading[Offloading<br/>Retire detection<br/>Justification archive] Onboarding --> Operational --> Maintenance --> Offloading
Phase | Key Activities | Documentation Requirements |
---|---|---|
Onboarding | Define scope, document requirements | Business case, threat mapping |
Operational | Daily monitoring execution | Runbooks, escalation paths |
Maintenance | Update for threat/IT changes | Change logs, test results |
Offloading | Archive obsolete use cases | Retirement justification |
Metrics Framework
To ensure continuous improvement and accountability, MaGMa integrates a structured metrics framework. These metrics allow SOC teams to assess the maturity, effectiveness, and growth of their detection use cases over time. By tracking implementation status, operational output, and strategic alignment, the framework supports data-driven decision-making and justifies resource allocation.
graph TD Metrics[Metrics Framework] --> E[Embedded Metrics] Metrics --> C[Control Metrics] Metrics --> O[Output Metrics] E --> E1[Implementation Completeness] E --> E2[Data Source Coverage] C --> C1[Framework Growth Rate] C --> C2[Maintenance Backlog] O --> O1[Alert Volume] O --> O2[Incident Conversion Rate]
Three metric types are embedded:
Embedded Metrics
- Implementation completeness (0-100%)
- Data source availability
Control Metrics
- Framework growth rate
- Maintenance backlog
Output Metrics
- Alert volume and quality
- Incident conversion rates
Implementation Tool
To streamline adoption and operationalization of the MaGMa framework, an Excel-based Implementation Tool is provided. This tool includes standardized templates, automated scoring mechanisms, and built-in support for traceability across all layers. It simplifies documentation, promotes consistency, and helps teams track use case development and maturity over time.
The MaGMa UCF Tool (Excel-based) provides:
- Preconfigured templates for all framework elements
- Automated maturity scoring
- Cross-layer traceability features
Download: MaGMa UCF Tool
Example Use Case
graph TD UC[Use Case:<br/>Unauthorized Service Account Usage] UC --> BZ[Business Layer] BZ --> BZ1[Purpose:<br/>Credential Theft Detection] BZ --> BZ2[Driver:<br/>FFIEC CAT] UC --> TL[Threat Layer] TL --> TL1[Technique:<br/>T1078.002] TL --> TL2[Actor:<br/>FIN8, TA505] UC --> IL[Implementation Layer] IL --> IL1[Data Sources:<br/>AD Logs, EDR] IL --> IL2[Status:<br/>Production<br/>FP <3%]
Unauthorized Service Account Usage
Business Layer
- Purpose: Detect credential theft/abuse
- Driver: FFIEC CAT requirements
Threat Layer
- Technique: T1078.002 (Valid Accounts: Domain Accounts)
- Actor: FIN8, TA505
Implementation Layer
- Data Sources: Active Directory logs, EDR
- Status: Production (FP rate <3%)
When to Adopt MaGMa
Ideal for organizations that:
- Manage 50+ detection use cases
- Require audit-ready documentation
- Need to demonstrate SOC maturity
- Experience alert fatigue from unmaintained rules
Resources
Resource | Description |
---|---|
Full Documentation | Official specification document |
MaGMa UCF Tool | Excel implementation template |
FI-ISAC Portal | Framework overview |
Short Whitepaper | Concise introduction |