From Continuous Monitoring to Continuous Awareness

Data volume produces the appearance of security awareness while frequently obscuring the understanding that awareness is supposed to provide. The distinction between monitoring and awareness is the difference between having data and understanding what it is telling you.

Part of the Phase I — Observation series

By Michael E. Ruiz

The monitoring industry has done a thorough job of convincing organizations that the objective of a security program is data collection. More sensors, more logs, more telemetry, more dashboards. The implicit promise is that sufficient data volume, properly aggregated and displayed, produces security. It does not. Data volume produces the appearance of security awareness while frequently obscuring the understanding that awareness is supposed to provide.

Cyber Situational Awareness is a term with a specific meaning that the industry has gradually diluted. Borrowed from military command-and-control doctrine, situational awareness describes the capacity to perceive relevant elements of an operational environment, understand their meaning, and project their likely future state. All three components matter.

Perception without understanding is noise. Understanding without projection is history. The goal is to know what is happening, what it means, and what is likely to happen next — in time to act on it.

Most industrial cybersecurity programs are good at the first part and weak on the second and third. They have sensors. They collect data. They have dashboards showing asset counts, protocol distributions, anomaly alerts, and CVE exposure scores. What they frequently lack is a shared picture of what the current state of the environment means for process operation, safety, and business continuity — and what decisions that state warrants.

The Common Operating Picture challenge is instructive here. Military operations depend on a shared picture of the operational environment, one that integrates information from multiple sources, displays it at an appropriate level of abstraction for the audience, and updates fast enough to remain relevant. Creating an equivalent in cyber environments is harder than it looks, for reasons that are not primarily technical. The data exists. The integration is achievable. The hard part is agreeing on what information the picture needs to convey, to whom, at what level of detail, and in what timeframe. A security analyst and a plant manager need different pictures of the same environment. The analyst needs anomaly detail. The plant manager needs to know whether the process is safe and whether any decisions are required. Building a common operating picture that serves both is a design problem, not a tool procurement problem.

Continuous monitoring, properly executed, produces a stream of signals. Continuous awareness requires a layer of interpretation between those signals and the people who need to act on them. That interpretation layer must account for the operational context: what is the process doing right now, what maintenance activities are in progress, are there known changes to the environment that explain the anomaly. Without that context layer, monitoring systems produce alert storms in which legitimate anomalies are indistinguishable from expected operational variations, and the response is either desensitization or paralysis.

The transition from monitoring to awareness requires resolving three things that technology alone cannot resolve. First, ground truth: an asset inventory and network baseline that is accurate enough to make anomaly detection meaningful. Second, context integration: a mechanism for incorporating operational events such as maintenance windows, planned network changes, and process upsets into the anomaly analysis so that expected variations are filtered out. Third, decision linkage: a clear definition of what different alert conditions mean for operations, what actions they warrant, and who has authority to take those actions. The third is the most neglected and the most important.

Awareness without the capacity to act on it is surveillance. The purpose of continuous monitoring is not to produce a historical record of what happened on the network. It is to enable decisions about risk, about operations, and about investment that would not be possible without that information. That purpose should drive the design of monitoring programs from the beginning, not be bolted on after the sensors are deployed. The question is not what can we monitor. The question is what decisions do we need to make, and what information do we need to make them well.

These ideas are available as keynote presentations and executive briefings. Explore speaking topics →