Scenarios & Selection
Eight real-world application scenarios illustrating how the audit and forensics platform addresses specific threat classes, with technical indicators, evidence requirements, and selection guidance for each.
Scenario 1: Ransomware Outbreak & Lateral Movement Reconstruction
When ransomware strikes an enterprise network, the most critical forensic challenge is reconstructing the full attack chain — from initial access through lateral movement to encryption detonation — within hours. This scenario requires tight integration between EDR telemetry, authentication logs, and network flow data to establish a defensible timeline that identifies patient zero, propagation paths, and the exact scope of compromise.
Scenario 2: Insider Data Theft via SaaS & Cloud Storage
Insider threats involving data exfiltration through SaaS platforms and cloud storage services represent one of the most challenging audit scenarios because the evidence is distributed across multiple cloud providers, each with different API structures, log formats, and retention policies. Effective detection requires unified identity correlation across on-premises IAM, SaaS audit logs, and DLP telemetry.
Scenario 3: Privileged Admin Cover-Up Attempt Detection
When a privileged administrator attempts to cover their tracks by deleting logs, modifying audit trails, or altering system configurations, the forensics platform must have pre-positioned evidence points that are architecturally inaccessible to the admin. This scenario validates the "record the recorder" principle and the value of immutable, out-of-band evidence collection.
Scenario 4: WAF Bypass & Application Layer Attack Investigation
Advanced web application attacks that bypass WAF controls require forensic analysis at the application layer, combining HTTP request/response logs, WAF decision logs, API gateway telemetry, and PCAP data to reconstruct the attack payload and determine the scope of data exposure. This scenario highlights the importance of application-layer logging depth and PCAP retention at web tiers.
Scenario 5: Cloud IAM Credential Leak & Unauthorized Access
Cloud IAM credential compromise — whether through phishing, code repository exposure, or third-party breach — enables attackers to operate as legitimate cloud identities, making detection dependent on behavioral analysis of API call patterns rather than traditional signature-based detection. Forensic reconstruction requires comprehensive cloud audit trail collection across multiple cloud services and regions.
Scenario 6: Software Supply Chain Attack Forensics
Supply chain attacks that introduce malicious code through trusted software update mechanisms or compromised third-party libraries require forensic analysis that spans software integrity verification, endpoint execution telemetry, and network communication analysis. The evidence chain must prove the integrity of the original software, the point of compromise, and the scope of malicious activity.
Scenario 7: OT/ICS Network Anomaly & Jump Host Audit
Operational Technology (OT) and Industrial Control System (ICS) environments present unique forensic challenges: limited logging capability on legacy PLCs and HMIs, strict change control requirements, and the potential for physical safety consequences from cyber incidents. Audit coverage must be achieved through network-layer telemetry and strict control of the jump host/bastion that provides IT-to-OT access.
Scenario 8: Regulatory Compliance Audit & Legal Hold Evidence Production
Regulatory compliance audits and legal proceedings require the production of evidence that meets strict admissibility standards: provable integrity, documented chain of custody, and verifiable authenticity. This scenario validates the entire evidence lifecycle — from collection through preservation, export, and presentation — ensuring that the platform can produce court-ready evidence packages on demand.
Scenario Selection Matrix
The following matrix maps each scenario to the required platform capabilities, enabling teams to prioritize implementation based on their most likely threat scenarios and compliance requirements. A checkmark indicates that the capability is mandatory for that scenario; a dash indicates it is optional but recommended.
| Capability | S1 Ransomware | S2 Insider | S3 Admin | S4 WAF | S5 Cloud IAM | S6 Supply Chain | S7 OT/ICS | S8 Compliance |
|---|---|---|---|---|---|---|---|---|
| NTP Sync ≤1s | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| EDR Telemetry | ✓ | ✓ | — | — | — | ✓ | — | — |
| Bastion/PAM Recording | ✓ | — | ✓ | — | — | — | ✓ | ✓ |
| Network Flow (NetFlow) | ✓ | — | — | — | ✓ | ✓ | ✓ | — |
| PCAP Capture | ✓ | — | — | ✓ | — | — | ✓ | — |
| Cloud Audit API | — | ✓ | — | — | ✓ | — | — | ✓ |
| WORM Evidence Vault | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
| Config Version Tracking | ✓ | — | ✓ | — | — | — | ✓ | ✓ |
| DLP Integration | — | ✓ | — | ✓ | — | — | — | — |
| Chain-of-Custody Workflow | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |