Security Use Case Mapping
Security use case mapping is the practice of connecting a SOC's detection logic, data sources, and analytical rules to specific, recurring attack scenarios so that every active threat pattern the organization faces has a corresponding detection capability assigned to it.