A selection of use cases to consider when deploying security canaries, considering the Security Canary Maturity Model.
Security Outcome | Maturity |
---|---|
Quickly test the impact of deploying canaries to understand any potential drawbacks and any initial signals from the environment. | Defined |
Plug a simple visibility gap in a particular area you have plans to replace in the future. | Defined |
Validate and improve the effectiveness of penetration testing processes. | Defined / Managed |
Demonstrate effective detection capabilities against simulated attacks (e.g. catch the next red team). | Defined / Managed |
Maintain comprehensive detection coverage as infrastructure evolves (i.e. canaries that evolve with the environment). | Managed |
Close specific, known detection gaps in your environment (that are too costly or noisy to handle with other techniques). | Managed |
Pro-actively prepare for 'unknown unknown' breaches or vulnerabilities. | Managed |
Implement assurance and detective controls to prove that your existing security controls are doing their job. | Managed |
Deploy similar or identical detective controls across disparate platforms (e.g. different public clouds) | Managed / Optimized |
Improve detection of 'insider risk' behaviors (e.g. misuse of access to privileged environments). | Managed / Optimized |
Develop a defense in depth strategy that you can share with auditors, regulators or customers. | Managed / Optimized |
Achieve detection and response capabilities effective against sophisticated adversaries such as nation state actors. | Optimized |