Monitoring & Detection · MD-Q01

Question: Has the organization defined a monitoring strategy (what to collect, from where, how long, and why) aligned to risks and use-cases?

Why This Matters

Collecting “everything” is expensive and noisy; collecting “nothing” blinds you. A clear strategy maps risks to telemetry and retention so you can detect, investigate, and prove compliance efficiently.

Maturity

0 — Unaware
No documented monitoring goals or scope.
1 — Ad Hoc
Logs collected sporadically; no use-case mapping.
2 — Defined
Minimum viable telemetry defined for key systems; retention baselines set.
3 — Managed
Use-case catalog (detections, investigations, audits) maintained; coverage tracked.
4 — Integrated
Risk register feeds telemetry priorities; cost vs value reviewed quarterly.
5 — Optimized
Continuous tuning with metrics; automated gap analysis and right-sizing.

How to Level Up

From → To Actions
0 → 1 List top 10 risks and the logs required for each.
1 → 2 Define a baseline schema (host, auth, endpoint, network, cloud) and retention targets.
2 → 3 Publish a use-case catalog with owners and success criteria.
3 → 4 Link risk changes to telemetry updates; review storage and cost quarterly.
4 → 5 Automate coverage checks and alert on gaps or noisy sources.

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
Log lake OpenSearch / Loki Scalable, cost-aware storage.
Catalog Wiki + Git Simple versioned use-case registry.
Schema OSQuery / ECS mapping Normalize key fields.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001:2022 A.8.16 (Logging & Monitoring)
CERT-In 2022 Monitoring guidance sections
DPDP Act 2023 Sec 9 (Safeguards), Sec 10 (Accountability)
NIST CSF 2.0 DE.CM-01..07 / GV.OC-03
NIRMATA Mapping MD-Q01 defines scope and evidence anchors.