Magma

RevisedAuthorComment
13.04.2025Roger JohnsenArticle added
Warning

This article is a work in progress and please consider this as a sneak peak. Quality checks hasn’t been applied yet. If you find something off, please contact me directly.

Introduction

The MaGMa Use Case Framework (UCF) is a structured methodology for managing security monitoring scenarios within Security Operations Centers (SOCs). Developed collaboratively by the Dutch Financial Information Sharing and Analysis Community (FI-ISAC), MaGMa (Management, Growth, Metrics & Assessment) provides systematic documentation of detection use cases across three layers and four lifecycle phases.


Structured Approach to Use Case Management

SOCs typically manage dozens to hundreds of detection use cases, which often become disorganized. MaGMa addresses this by:

  • Establishing traceability between business objectives and technical implementations
  • Standardizing documentation through predefined templates
  • Embedding metrics to measure framework maturity
  • Supporting full lifecycle management

The Three-Layer Model

The MaGMa Use Case Framework is structured across three distinct but interconnected layers: Business, Threat, and Implementation. Each layer captures specific aspects of a use case, ensuring alignment from strategic objectives down to technical execution. The diagram below illustrates how information flows between these layers, with key elements represented at each level:

graph LR
    subgraph Business Layer
        A1[Purpose]
        A2[Drivers]
        A3[Stakeholders]
        A4[Output]
    end

    subgraph Threat Layer
        B1[ATT&CK Tactics]
        B2[Kill Chain Mapping]
        B3[Threat Actor Profiles]
        B4[Behavioral Indicators]
    end

    subgraph Implementation Layer
        C1[Data Sources]
        C2[Detection Logic]
        C3[Status]
        C4[Tuning Guidance]
    end

    A1 --> B1
    A2 --> B2
    A3 --> B3
    A4 --> B4

    B1 --> C1
    B2 --> C2
    B3 --> C3
    B4 --> C4

1. Business Layer (Strategic)

Focuses on why the use case matters to the organization. It documents business objectives, compliance drivers, involved stakeholders, and the intended output (e.g., alerts, reports). Documents organizational relevance with:

WhatDescription
PurposeBusiness value proposition (e.g., fraud prevention)
DriversCompliance requirements (e.g., PCI DSS, GDPR)
StakeholdersResponsible business units
OutputExpected deliverables (alerts, reports)

2. Threat Layer (Tactical)

Bridges the gap between business intent and technical implementation. This layer maps the use case to threat intelligence elements such as MITRE ATT&CK techniques, adversary behaviors, and known threat actors. Aligns with adversary behaviors through:

WhatDescription
MITRE ATT&CKtechniques and tactics
Kill Chainpositioning
Threat Actorprofiles
Behavioral IndicatorsSpecific TTP

3. Implementation Layer (Operational)

Defines how the use case is executed on a technical level. It includes log source requirements, detection logic (queries/rules), development status, and tuning considerations. Details technical execution:

WhatDescription
Data SourcesRequired logs (Windows Event IDs, EDR)
Detection LogicSIEM queries, correlation rules
StatusDevelopment stage (PoC → Production)
Tuning GuidanceKnown false positives

Lifecycle Management

Effective use case management requires more than initial deployment—it demands continuous oversight. MaGMa structures this through a four-phase lifecycle model that ensures each use case remains relevant, actionable, and aligned with evolving threats and business needs. This lifecycle spans onboarding, daily operations, ongoing maintenance, and eventual retirement.

MaGMa formalizes four management phases:

flowchart LR
    Onboarding[Onboarding<br/>Define scope, requirements<br/>Business case, mapping]
    Operational[Operational<br/>Monitoring & triage<br/>Runbooks, escalations]
    Maintenance[Maintenance<br/>Adjust to changes<br/>Logs, test results]
    Offloading[Offloading<br/>Retire detection<br/>Justification archive]

    Onboarding --> Operational --> Maintenance --> Offloading
PhaseKey ActivitiesDocumentation Requirements
OnboardingDefine scope, document requirementsBusiness case, threat mapping
OperationalDaily monitoring executionRunbooks, escalation paths
MaintenanceUpdate for threat/IT changesChange logs, test results
OffloadingArchive obsolete use casesRetirement justification

Metrics Framework

To ensure continuous improvement and accountability, MaGMa integrates a structured metrics framework. These metrics allow SOC teams to assess the maturity, effectiveness, and growth of their detection use cases over time. By tracking implementation status, operational output, and strategic alignment, the framework supports data-driven decision-making and justifies resource allocation.

graph TD
    Metrics[Metrics Framework] --> E[Embedded Metrics]
    Metrics --> C[Control Metrics]
    Metrics --> O[Output Metrics]

    E --> E1[Implementation Completeness]
    E --> E2[Data Source Coverage]

    C --> C1[Framework Growth Rate]
    C --> C2[Maintenance Backlog]

    O --> O1[Alert Volume]
    O --> O2[Incident Conversion Rate]

Three metric types are embedded:

  1. Embedded Metrics

    • Implementation completeness (0-100%)
    • Data source availability
  2. Control Metrics

    • Framework growth rate
    • Maintenance backlog
  3. Output Metrics

    • Alert volume and quality
    • Incident conversion rates

Implementation Tool

To streamline adoption and operationalization of the MaGMa framework, an Excel-based Implementation Tool is provided. This tool includes standardized templates, automated scoring mechanisms, and built-in support for traceability across all layers. It simplifies documentation, promotes consistency, and helps teams track use case development and maturity over time.

The MaGMa UCF Tool (Excel-based) provides:

  • Preconfigured templates for all framework elements
  • Automated maturity scoring
  • Cross-layer traceability features

Download: MaGMa UCF Tool

Example Use Case

graph TD
    UC[Use Case:<br/>Unauthorized Service Account Usage]

    UC --> BZ[Business Layer]
    BZ --> BZ1[Purpose:<br/>Credential Theft Detection]
    BZ --> BZ2[Driver:<br/>FFIEC CAT]

    UC --> TL[Threat Layer]
    TL --> TL1[Technique:<br/>T1078.002]
    TL --> TL2[Actor:<br/>FIN8, TA505]

    UC --> IL[Implementation Layer]
    IL --> IL1[Data Sources:<br/>AD Logs, EDR]
    IL --> IL2[Status:<br/>Production<br/>FP <3%]

Unauthorized Service Account Usage
Business Layer

  • Purpose: Detect credential theft/abuse
  • Driver: FFIEC CAT requirements

Threat Layer

  • Technique: T1078.002 (Valid Accounts: Domain Accounts)
  • Actor: FIN8, TA505

Implementation Layer

  • Data Sources: Active Directory logs, EDR
  • Status: Production (FP rate <3%)

When to Adopt MaGMa

Ideal for organizations that:

  • Manage 50+ detection use cases
  • Require audit-ready documentation
  • Need to demonstrate SOC maturity
  • Experience alert fatigue from unmaintained rules

Resources

ResourceDescription
Full DocumentationOfficial specification document
MaGMa UCF ToolExcel implementation template
FI-ISAC PortalFramework overview
Short WhitepaperConcise introduction