For detection engineering teams
who run the rule lifecycle as a structured engagement record
Detection engineering teams own the workflow that sits between the threat model, the MITRE ATT&CK coverage matrix, the rule register, the false-positive backlog, the SIEM and SOAR target stack, the log source inventory, the alert-to-case tuning record, the purple-team operations log, and the audit evidence pack into NIST CSF 2.0 DE, NIST SP 800-53 SI and AU, SOC 2 CC7, ISO 27001 A.8.16, and PCI DSS Requirement 10. The work runs across a SIEM console, a SOAR console, a coverage spreadsheet, a rule repository, a false-positive ticket queue, a Slack channel with the red team that ages out, and a steering committee deck that gets rebuilt from scratch every cycle. SecPortal pairs engagement records per detection workstream, findings management with CVSS 3.1 and MITRE ATT&CK tactic and technique tagging on every finding, retesting workflows that pair the post-deployment replay to the original missed-technique finding, document management for the detection charter and rule-writing standard, compliance tracking across NIST CSF 2.0 DE, NIST SP 800-53 SI and AU, SOC 2 CC7, ISO 27001 A.8.16, PCI DSS Requirement 10, and the other 21 supported frameworks, AI-assisted reporting, role-based access control with enforced multi-factor authentication, and an append-only activity log on one workspace.
No credit card required. Free plan available forever.
A detection engineering workspace built around the technique and the rule it covers
Detection engineering teams own the workflow that sits between the threat model, the ATT&CK coverage matrix, the rule register, the false-positive backlog, the SIEM and SOAR target stack, the log source inventory, the alert-to-case tuning record, the purple-team operations log, and the audit-evidence trail into NIST CSF 2.0 DE, NIST SP 800-53 SI and AU, SOC 2 CC7, ISO 27001 A.8.16, and PCI DSS Requirement 10. The work usually carries across a SIEM console, a SOAR console, a coverage spreadsheet, a rule repository on Git, a false-positive ticket queue, a Slack channel with the red team that ages out before the next operation, and a steering committee deck that gets rebuilt from scratch every cycle. The cost is not the licensing. It is the reconciliation hours each cycle and the coverage drift between cycles.
SecPortal gives detection engineering teams one workspace for engagement records per detection workstream, findings management with CVSS 3.1 scoring and MITRE ATT&CK tactic, technique, and sub-technique tags on every finding, retesting workflows that pair the post-deployment replay to the original missed technique, document management for the detection engineering charter and the rule-writing standard and the rule retirement policy, compliance tracking that covers NIST CSF 2.0 DE, NIST SP 800-53 SI and AU families, SOC 2 CC7, ISO 27001 A.8.16, PCI DSS Requirement 10, and the other 21 supported frameworks in parallel, AI-assisted programme reporting, role-based access control with enforced multi-factor authentication, and an append-only activity log on one workspace that the red-team partner, the purple-team partner, the SOC partner, and the audit observer all share with the detection engineering team.
SecPortal is not a SIEM, a SOAR, a UEBA platform, an XDR or EDR platform, a log management system, a detection-as-code rule store, or a Sigma rule library. It does not ingest event telemetry from endpoint, network, identity provider, cloud platform, or application sources, it does not run correlation logic, it does not author detection content on the platform itself, it does not ship a Sigma or Snort rule pack, and it does not connect through API to a SIEM, a SOAR, a UEBA platform, an XDR, or a ticketing tool. Teams running a dedicated SIEM, SOAR, UEBA, XDR, or detection-as-code platform keep that detection platform; SecPortal carries the engagement, the technique finding, the coverage outcome, the rule lifecycle record (referenced by rule identifier and platform target), the retest run, the exception decision, the documentation, and the audit trail next to those platforms rather than inside them.
Capabilities detection engineering teams use cycle to cycle
Engagement records per detection workstream
Open an engagement per detection workstream (technique coverage assessment, ATT&CK matrix sweep, purple-team operation, red-team engagement debrief, detection content rollout cycle, rule retirement cycle, false-positive remediation cycle, SIEM migration baseline, log source onboarding cycle, alert-to-case threshold tuning, detection tabletop). The technique inventory, the coverage matrix, the rule register, the rule retirement decision log, the false-positive register, the detection engineering RACI, and the steering committee minutes attach as documents on the same engagement record. The detection programme reads from one workspace rather than from a folder hierarchy that never survives a SIEM migration.
Technique findings with MITRE ATT&CK context
Every technique that gets exercised against the organisation lands on the engagement record for the assessment with the ATT&CK tactic, the technique identifier, the sub-technique identifier, an auto-calculated CVSS 3.1 vector, severity, evidence, named owner, and the detection outcome (missed, partial, alerted-on, detected, replayed-after-tuning). Red-team engagement findings, purple-team operation findings, third-party threat-led penetration test findings, breach-and-attack-simulation tool exports, and tabletop technique outcomes consolidate on one queue. The detection coverage matrix reads from one engagement record rather than from a coverage spreadsheet, an exercise log, and a vendor BAS console.
Detection content lifecycle on the engagement record
A missed technique becomes a finding with the technique identifier, the evidence from the original action, and a remediation owner on the detection-engineering side. After the rule, query, or correlation logic is written, the replay is logged against the same finding with the new evidence and the updated outcome. The audit trail shows attack, gap, rule change, replay, and final outcome on a single record so the rule lifecycle does not depend on a shared spreadsheet that ages out before the next exercise.
Retesting workflow paired to the original finding
When the detection team writes a new rule or tunes an existing one, the retest run pairs to the same finding rather than opening a new record. The aging clock keeps running on the original capture date, the verification evidence sits with the original report, and the activity log records who verified what against which retest run with timestamp and rationale. Rule effectiveness sits on one record across the lifecycle.
Document management for the detection programme estate
Document management attaches the detection engineering charter, the rule-writing standard, the rule retirement policy, the false-positive triage runbook, the log source inventory, the SIEM migration plan, the on-call rotation, the detection RACI, the tabletop record, the threat model that feeds the rule backlog, and the audit-evidence trail to the engagement record for the workstream. Plans, version history, and the upload trail live on the same record the findings sit on.
Cross-framework compliance tracking for the detection estate
Compliance tracking maps engagement records and findings against the MITRE ATT&CK framework as the methodology reference, the NIST CSF 2.0 DE (Detect) function with its categories on continuous monitoring and anomaly analysis, the NIST SP 800-53 SI and AU control families on system monitoring and audit, the SOC 2 Trust Services Criteria CC7 monitoring controls, the ISO 27001 Annex A.8.16 monitoring activities control, the PCI DSS Requirement 10 logging and monitoring requirement, and the other 21 supported frameworks on the same record. One mapping satisfies multiple audit packs.
AI-assisted detection programme reporting
AI-assisted reporting regenerates detection programme executive summaries, per-engagement coverage readouts, purple-team operation narratives, rule retirement cycle summaries, false-positive remediation summaries, SIEM migration progress writeups, and detection compliance summaries from the live engagement data on demand. The detection steering committee, the audit committee, the CISO readout, and the SOC leadership readout regenerate from the same record the detection team runs on.
Multi-factor authentication, role-based access control, and activity log
Multi-factor authentication is enforced on every workspace account. Role-based access control scopes the detection engineering lead, the senior detection engineer, the rule reviewer, the SOC partner, the red-team partner, the audit observer, and the steering committee participant to the engagements they actually need. An append-only activity log records every finding update, scan run, document upload, retest run, exception decision, comment, credential rotation, and team change with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the programme trail reproducible at audit time.
Pair-of-record with the offensive operators
Red-team and purple-team operations share the same finding record with the detection engineering team. When the offensive operator logs the technique they exercised, the detection engineer reads it on the same engagement and writes against it; when the detection engineer ships a rule, the offensive operator replays the technique and updates the outcome on the same finding. The hand-off from technique fired to detection written is one record rather than a debrief email thread that decays.
How detection engineering teams run the discipline inside SecPortal
A detection engineering programme that holds up under audit fieldwork, board questioning, cyber insurance underwriting, and post-incident review operates on a small set of disciplines. The detection engineering charter, the rule-writing standard, the rule retirement policy, the false-positive runbook, the coverage matrix, the rule register, and the audit-evidence trail inherit each one rather than carving out a parallel operating model per artefact.
- Treat each detection workstream as a structured engagement record rather than as a recurring meeting. The technique coverage assessment, the purple-team operation, the rule retirement cycle, the false-positive remediation cycle, the SIEM migration baseline, the log source onboarding cycle, the alert-to-case threshold tuning, and the detection tabletop each live on a dated record with named owners, attached artefacts, and the live finding queue alongside.
- Run the detection coverage matrix off the live engagement record rather than a quarterly coverage spreadsheet. Red-team findings, purple-team findings, threat-led penetration test findings, breach-and-attack-simulation exports, and tabletop technique outcomes all attach to the engagement record for the assessment, so the coverage matrix reads as the live engagement queue rather than as a parallel artefact maintained by hand.
- Tie every detection outcome to the MITRE ATT&CK technique and sub-technique it covers. Tactic, technique identifier, sub-technique identifier, and the detection outcome (missed, partial, alerted-on, detected, replayed-after-tuning) ride on the finding, so coverage drift across operations is visible rather than implicit and the rule register can be re-read by ATT&CK code rather than by rule title.
- Anchor detection control evidence against the same engagement records that hold the live operational findings, through compliance tracking. NIST CSF 2.0 DE function evidence, NIST SP 800-53 SI and AU family evidence, SOC 2 CC7 evidence, ISO 27001 A.8.16 monitoring activities evidence, and PCI DSS Requirement 10 evidence read from the live record rather than from a detection spreadsheet the team maintains by hand.
- Capture exceptions on missed-by-design techniques, accepted-coverage gaps, decommissioned rules, and rule suppression decisions on the same record as the finding they cover, with linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, and review cadence. The exception register reads as a queue of dated decisions with named owners and explicit expiry, rather than as a narrative document.
- Run the rule lifecycle on the same workspace the detection coverage assessment runs on. The rule-writing standard, the rule retirement policy, the false-positive runbook, the log source inventory, and the rule register sit on the engagement record alongside the live findings the steering committee reads off, so a rule retirement decision and the finding that motivated it are read on one record.
- Regenerate the detection leadership view from the live record through AI-assisted reporting rather than maintain a parallel reporting artefact. The detection steering committee deck, the audit committee report, the CISO readout, and the SOC leadership readout read from the same engagement record the detection team operates on.
- Maintain an append-only activity trail across every workstream, every finding, every exception decision, every retest, every document version, every credential rotation, and every team change, so the question of why the detection programme retired a specific rule or accepted a specific gap has a single defensible answer at regulator review time.
From technique fired to rule written to replay verified, on one engagement record
The detection programme loop is open the detection workstream engagement, log the techniques that get exercised against the organisation, write the detection content against each missed or partially detected technique, replay after tuning, map the controls, record the exceptions, route the cross-team work, regenerate the leadership view, and read the recurring cadence. SecPortal runs a single workflow that the detection engineering team, the red-team partner, the purple-team partner, the SOC partner, the audit committee, and the steering committee can all work against without re-keying state into another tool.
- 1Open an engagement per detection workstream. Capture the workstream owner, the scope (the ATT&CK matrix section, the threat actor profile, the asset class, the log source set, the SIEM and SOAR target stack), the applicable framework set (MITRE ATT&CK as methodology reference, NIST CSF 2.0 DE function, NIST SP 800-53 SI and AU families, SOC 2 CC7, ISO 27001 A.8.16, PCI DSS Requirement 10), the in-scope offensive partner, the in-scope SOC partner, and the named audit observers on the engagement record. Attach the detection engineering charter, the rule-writing standard, the rule retirement policy, the log source inventory, and the detection RACI as documents.
- 2Run technique findings against the engagement record. Red-team operators log techniques against the engagement they exercised them on; purple-team operations log techniques and detections in parallel against the same engagement; threat-led penetration test reports and breach-and-attack-simulation exports import in bulk; tabletop technique outcomes log manually. Each finding carries the ATT&CK tactic, the technique identifier, the sub-technique identifier, the CVSS 3.1 vector, severity, evidence, named owner, and the detection outcome.
- 3Write the detection content against the finding rather than against a separate rule backlog. A missed technique gets a rule, a query, or a correlation logic written by a named detection engineer with the rule identifier, the platform target, the query or rule body summary, the test traffic, and the deployment status logged on the same finding. The aging clock keeps running on the original capture date.
- 4Replay after tuning. Once the rule is deployed, the offensive partner or the breach-and-attack-simulation tool replays the technique and the detection engineer logs the post-deployment outcome on the same finding. The retest run targets the same engagement, validates the rule, and moves the finding state from in_progress to resolved or verified on the engagement record. The activity log records who verified what against which retest run with timestamp and rationale.
- 5Map findings, technique coverage, and engagement records against the NIST CSF 2.0 DE function (Detect, with DE.CM continuous monitoring and DE.AE adverse event analysis categories), NIST SP 800-53 SI and AU control families, SOC 2 CC7 Trust Services Criteria, ISO 27001 A.8.16 monitoring activities, PCI DSS Requirement 10, HIPAA Security Rule audit controls, and the other supported frameworks through compliance tracking. The audit-time evidence packs read from the same engagement records the detection team operates on.
- 6Capture exceptions, compensating controls, and accepted-gap decisions on long-tail techniques where coverage cannot be written, on rules that need to stay suppressed for noise reasons, on missed-by-design techniques outside the threat model, and on log sources the platform cannot ingest yet on the same record as the findings they cover. The exception register reads as a queue of dated decisions with named owners and explicit expiry, so the detection steering committee reads exceptions that are actually due rather than re-debating the same items.
- 7Route the work through role-based access control and multi-factor authentication. Detection engineers see the engagements for the workstreams they operate, the rule reviewer reads the rule register and the rule retirement queue, the SOC partner reads the alert-to-case threshold tuning record, the red-team partner reads the purple-team operations they share with the detection team, audit observers read the programme posture across the detection estate without seeing the full operational backlog, and the steering committee reads the leadership view that regenerates on demand.
- 8Regenerate the detection leadership view through AI-assisted reporting. Executive summaries, per-engagement coverage readouts, purple-team operation narratives, rule retirement cycle summaries, false-positive remediation summaries, SIEM migration progress writeups, and detection compliance summaries draft from the live engagement data on demand. The detection team edits drafts rather than writes the deck from a blank page each cycle.
- 9Read the recurring programme cadence from the append-only activity log. Every finding update, scan run, document upload, retest run, exception decision, comment, credential rotation, and team change is recorded with the actor, the timestamp, and the action. CSV export keeps the programme trail reproducible at regulator review time.
Where the detection engineering view connects to the rest of the workspace
Most detection engineering functions adopt SecPortal in three phases: bring every detection workstream onto an engagement record so the coverage matrix, the rule register, the false-positive backlog, and the findings live on one record; pair the engagement records with the red-team and purple-team partner so the technique log and the detection write-up share the same finding; and route the audit, steering committee, and SOC leadership cadence through compliance tracking, role-based access control, multi-factor authentication, and AI-assisted reporting so the rule reviewer, the SOC partner, and the audit committee all read from the same source the detection team runs on. The relevant capability, workflow, framework, and blog pages explain each phase in detail.
- The engagement record model that anchors every detection workstream is covered on the engagement management feature page, the per-workstream findings repository with ATT&CK tagging on the findings management feature page, and the rule register, charter, and standard attachment surface on the document management feature page.
- The post-deployment replay loop that pairs to the missed-technique finding on the retesting workflows feature page, the multi-framework control mapping a single engagement record rides on the compliance tracking feature page, and the AI-assisted detection programme reporting surface on the AI reports feature page.
- The append-only programme trail across every detection workstream on the activity log feature page, the role-scoped access for detection engineers, rule reviewers, SOC partners, and audit observers on the team management feature page, and the enforced multi-factor authentication on every workspace account on the multi-factor authentication feature page.
- The MITRE ATT&CK methodology anchor on the MITRE ATT&CK framework page, the NIST CSF 2.0 Detect function evidence anchor on the NIST CSF 2.0 framework page, and the NIST SP 800-53 SI and AU family evidence anchor on the NIST 800-53 framework page.
- The SOC 2 Trust Services Criteria anchor for the CC7 monitoring controls on the SOC 2 framework page, the ISO 27001 framework anchor for Annex A.8.16 monitoring activities on the ISO 27001 framework page, and the PCI DSS framework anchor for Requirement 10 logging and monitoring on the PCI DSS framework page.
- The purple-team operating workflow where offensive and defensive operators share the same finding on the purple teaming use case, the pentest-to-detection-engineering handover workflow on the pentest finding handover to SOC use case, and the threat-led penetration testing workflow on the threat-led penetration testing use case.
- The exception register for accepted-gap decisions and rule suppression decisions on the vulnerability acceptance and exception management use case, the security finding fix verification workflow on the security finding fix verification use case, and the retesting workflow that pairs the post-deployment replay to the original missed-technique finding on the retesting use case.
- The red-teaming workflow on the red teaming use case, the security operations orchestration explainer on the SOAR explainer, and the red team versus penetration test article on the red team versus penetration test article.
Where the detection engineering team role sits next to adjacent personas
Detection engineering teams run the rule-and-content discipline that sits between the offensive operator function (the in-house red team), the defensive responder function (the SOC analyst), the platform-owner function (the security engineering team), the GRC and compliance evidence owner, the cross-source vulnerability management backlog owner, the application security discipline, the executive sponsor (the CISO), and the cross-team programme coordinator (the security program manager). The detection engineering team owns the rule lifecycle rather than any one of those adjacent shapes.
If your function is the in-house red team that exercises techniques against the organisation as a continuous programme, the SecPortal for in-house red teams page covers the offensive operator shape that pairs to the detection engineering discipline on the shared engagement record.
If your function is the SOC analyst function that triages the alerts the detection content generates and operates the incident response on top, the SecPortal for SOC analysts page covers the alert-consumer shape that pairs to the detection engineering content author shape.
If your function is the security engineering platform discipline that owns the SIEM, the SOAR, the log pipeline, and the detection-as-code tooling that the detection engineering team writes against, the SecPortal for security engineering teams page covers the platform-owner shape the detection content runs on.
If your function is the application security discipline that owns the AppSec testing backlog and the application-side findings the detection layer should also catch, the SecPortal for AppSec teams page covers the application security shape that feeds findings into the same workspace the detection team operates on.
If your function is the cross-source vulnerability management backlog owner that consolidates the detection-adjacent findings into the wider security backlog, the SecPortal for vulnerability management teams page covers the unified queue discipline that the detection-adjacent findings land on.
If your function is the GRC and compliance evidence owner that assembles audit packs from detection controls into NIST CSF 2.0 DE, NIST SP 800-53 SI and AU, SOC 2 CC7, ISO 27001 A.8.16, and PCI DSS Requirement 10, the SecPortal for GRC and compliance teams page covers the evidence-side discipline that reads from the same record the detection team operates on.
If your function is the internal security team that runs the consolidated security programme across detection engineering, AppSec, vulnerability management, identity, and incident response, the SecPortal for internal security teams page covers the consolidated workspace view the detection programme rolls into.
If your function is programme-level executive sponsorship and board-level reporting rather than the detection discipline specifically, the SecPortal for CISOs and security leaders page covers the leadership-tier reporting workflow the detection posture rolls up into.
SecPortal is built for detection engineering teams who want one workspace for the log-coverage-write-replay-map-report loop on the detection surface: engagement records per detection workstream, technique findings with MITRE ATT&CK tactic and technique and sub-technique tags, the rule write-up and the post-deployment replay paired to the original missed-technique finding, multi-framework compliance tracking that covers NIST CSF 2.0 DE, NIST SP 800-53 SI and AU, SOC 2 CC7, ISO 27001 A.8.16, and PCI DSS Requirement 10 in parallel, AI-assisted programme reporting, role-based access control with enforced multi-factor authentication, document management for the detection engineering charter, rule-writing standard, and rule retirement policy, and an append-only activity log on top. The rule reviewer reads the rule retirement queue, the SOC partner reads the alert-to-case threshold tuning record, the red-team partner reads the shared engagements, the audit committee reads the programme posture, and the detection team gets back the hours that used to disappear into reconciliation between coverage spreadsheets, rule repositories, false-positive ticket queues, and steering committee decks.
The problems you face
And how SecPortal solves each one.
Technique coverage lives in a coverage spreadsheet, a rule repository on Git, a SIEM dashboard, a SOAR runbook, a purple-team exercise log, and a steering committee deck, and the detection team rebuilds the consolidated picture every quarter from six artefacts that never reconcile to each other
Every technique that gets exercised against the organisation lands on the engagement record for the assessment with the MITRE ATT&CK tactic, the technique identifier, the sub-technique identifier, the CVSS 3.1 vector, severity, evidence, named owner, and the detection outcome (missed, partial, alerted-on, detected, replayed-after-tuning). Red-team findings, purple-team findings, threat-led penetration test findings, breach-and-attack-simulation exports, and tabletop technique outcomes consolidate on one queue. The coverage matrix reads from one record.
The hand-off from offensive operator to detection engineer happens in a Slack thread that ages out, a debrief email, and a screenshot folder on a shared drive, and by the time the next purple-team operation kicks off the rule that should have been written against the previous missed technique is still on the backlog
Red-team and purple-team operations share the same finding record with the detection engineering team. When the offensive operator logs the technique they exercised, the detection engineer reads it on the same engagement and writes against it; when the detection engineer ships a rule, the offensive operator replays the technique and updates the outcome on the same finding. The hand-off from technique fired to detection written is one record rather than a debrief email thread.
Rule lifecycle decisions on retirement, suppression, and noise tuning are stored in narrative emails and a wiki page that never reconciles to the rule repository, and when the audit committee asks why a specific rule was retired the rationale cannot be reconstructed without a multi-team excavation
Document management attaches the detection engineering charter, the rule-writing standard, the rule retirement policy, the false-positive runbook, the log source inventory, the SIEM migration plan, the on-call rotation, the detection RACI, the tabletop record, and the threat model that feeds the rule backlog to the engagement record for the workstream. Plans, version history, and the upload trail live on the same record the findings sit on.
Mapping detection controls to the NIST CSF 2.0 DE function, to NIST SP 800-53 SI and AU control families, to SOC 2 CC7 Trust Services Criteria, to ISO 27001 Annex A.8.16 monitoring activities, to PCI DSS Requirement 10 logging and monitoring, and to the HIPAA Security Rule audit controls is parallel work that produces five reconciled evidence packs each audit cycle
Compliance tracking maps engagement records and findings against NIST CSF 2.0 DE function (with the DE.CM continuous monitoring and DE.AE adverse event analysis categories), NIST SP 800-53 SI and AU control families, SOC 2 CC7, ISO 27001 A.8.16, PCI DSS Requirement 10, HIPAA Security Rule audit controls, NIST SP 800-171 audit and accountability controls, and the other 21 supported frameworks on the same record. One mapping satisfies multiple audit packs, and CSV export of findings, control status, and the activity trail is available when the auditor wants the trail in their own format.
Exceptions on long-tail techniques where coverage cannot be written, on rules that need to stay suppressed for noise reasons, on missed-by-design techniques outside the threat model, and on log sources the platform cannot ingest yet are stored in narrative emails that the audit committee cannot reconstruct decision chains from
The vulnerability acceptance and exception management workflow captures the linked finding, severity, compensating controls, residual likelihood, residual impact, business rationale, expiry, and review cadence on a structured exception attached to the finding. The exception register reads as a queue of dated decisions with named owners and explicit expiry, so the detection steering committee reads exceptions that are actually due rather than re-debating the same items.
Retesting a rule after tuning lives in a screenshot folder and an email thread, the post-deployment outcome never lands back on the missed-technique finding, and the aging clock on the original capture date restarts every time the platform team migrates the SIEM
Retesting workflows target the engagement record, pair the post-deployment replay to the original missed-technique finding, and move the finding state from in_progress to resolved or verified on the same record. The aging clock keeps running on the original capture date, the activity log records who verified what against which retest run with timestamp and rationale, and rule effectiveness sits on one record across the lifecycle.
Detection programme reporting into the CISO, the steering committee, the audit committee, and post-incident review is a multi-day copy-paste exercise across a SIEM coverage report, a rule repository changelog, a purple-team exercise summary, a false-positive trend chart, and last-cycle decks, and the leadership view drifts away from the operational reality the detection team is running on between cycles
AI-assisted reporting regenerates detection programme executive summaries, per-engagement coverage readouts, purple-team operation narratives, rule retirement cycle summaries, false-positive remediation summaries, SIEM migration progress writeups, and detection compliance summaries from the live engagement data on demand. The leadership view, the steering committee deck, the audit committee report, the CISO readout, and the post-incident review pack read from the same record the detection team runs on.
The audit trail across detection findings, rule write-ups, retest runs, exception decisions, and team changes is rebuilt from chat history each cycle, and SIEM migration, detection engineer rotation, rule repository tooling changes, and tool consolidation all break the narrative
The activity log records every finding update, scan run, document upload, retest run, exception decision, comment, credential lifecycle event, and team change with the actor, the entity, the timestamp, and the action. Plan retention covers 30, 90, or 365 days, and CSV export keeps the programme trail reproducible at regulator review time. Role-based access control scopes detection engineers, rule reviewers, SOC partners, red-team partners, audit observers, and the steering committee to the engagements they actually need, and multi-factor authentication is enforced on every workspace account.
Key features for you
Orchestrate every security engagement from start to finish
Vulnerability management software that tracks every finding
Verify fixes and track reopens on the same finding record
Compliance tracking without a full GRC platform
Document management for every security engagement
AI-powered reports in seconds, not days
Every action recorded across the workspace
Collaborate across your entire team
Multi-factor authentication on every workspace
Run the detection rule lifecycle on one engagement record
Engagement records per detection workstream, technique findings with MITRE ATT&CK tactic and technique and sub-technique tags, the rule write-up and post-deployment replay paired to the original missed-technique finding, compliance tracking across NIST CSF 2.0 DE, NIST SP 800-53 SI and AU, SOC 2 CC7, ISO 27001 A.8.16, and PCI DSS Requirement 10, AI-assisted reporting, role-based access control with enforced multi-factor authentication, document management for the detection charter and rule-writing standard, and an append-only activity log on one workspace. Free plan available.
No credit card required. Free plan available forever.