Driving value and closing the loop

Five downstream uses of documentation

πŸ”§ Detection engineering

Documentation reveals detection gaps, false-positive trends, and emerging threat indicators. Detailed records of IOCs, missed alerts, and lateral movement patterns inform rule refinement and new detections. Well-documented cases often surface subtle adversary behaviors initially overlooked.

πŸŽ“ Analyst training

Real events become sanitized simulations or tabletop exercises. These scenarios build analyst proficiency. Documentation of decision-making, especially in complex or unusual cases, serves as teaching material that develops critical thinking among junior responders.

βš™οΈ Process improvement

Records of operational gaps, tooling limitations, and process breakdowns drive systematic improvement. Trends across cases surface friction points that single-case retrospectives would miss. Process inefficiencies become tracked items with owners.

πŸ“Š Metrics and executive reporting

Aggregated documentation produces impact summaries, risk trends, and security-posture metrics. Consistent records enable accurate measurement of MTTD and MTTR. These metrics demonstrate program effectiveness and support budget and strategic decisions.

🧠 Threat intelligence

Comprehensive documentation captures new tactics, techniques, and procedures observed during investigations. These insights enrich intelligence repositories and strengthen proactive threat hunting. When appropriate, sanitized intelligence is shared with industry partners and ISACs to enhance collective defense.


What you have, across all seven chapters

Across seven chapters, the methodology gave you four things.

πŸ”€ A vocabulary

Seven letters, each answering one question. A shared language that travels across teams and across cases, and that survives team turnover.

πŸ—οΈ A structure

Three phases that group the seven letters into a logical flow: preparation, investigation, resolution. The structure does the orienting; attention goes to the evidence.

🧭 A discipline

Each phase has a deliverable. Each deliverable is the input to the next phase. Skipping a phase shows up downstream. The discipline holds even when the case is small or the analyst is junior.

πŸͺœ A scaffold

New analysts have a map. Experienced analysts have a checklist. Both find the methodology useful for their own reasons, and the methodology improves as cases reveal where it bends.


What ASSURED is, and is not

ASSURED is a triage methodology. Seven phases, Alert, Subject, Scope, Uncover, Risk, Escalation, Documentation, that take an analyst from β€œan alert fired” to β€œthe case is closed or handed off, and the record survives.” It is not an incident-response framework. It is not a SOAR playbook. It is the work an analyst does before either of those starts.

The methodology's four commitments

Decisions are based on named inputs, not feelings. Two analysts working the same alert produce comparable outputs because the inputs are explicit: which detection mechanism fired, which dimensions of Subject came back clean or dirty, which entities are in or out of scope, which ATT&CK techniques the chain maps to, which RATM dimensions score high.

Roles and handoffs are explicit. The triage analyst owns the verdict and the handoff packet. The incident responder owns the lifecycle. The SOC manager owns the closure review. When the handoff is structured, no role does the other’s work.

False-positives are first-class cases. A documented close at triage carries the same evidentiary weight as a documented escalation. The methodology refuses the false-positive shrug; it asks for the same nine-section record either way.

The loop is real. Scope β†’ Uncover β†’ Risk iterates as new evidence surfaces. Refining a scope mid-case is the methodology working, not the methodology failing.


Where to go from here

🎯 Apply it to your next alert

The methodology is not a textbook; it is a practice. Use the structure on your next investigation and notice where you would otherwise have skipped a step. The patterns reveal themselves through use.

πŸ§‘β€πŸ« Teach it

The methodology was designed to be taught. Mentoring a newer analyst through their first ASSURED-structured case is one of the fastest ways to refine your own use of it. The act of explaining sharpens application.

🀝 Contribute

The methodology lives at github.com/block/assured-methodology. Feedback, corrections, and contributions are welcome. The next version of ASSURED is shaped by the people who use it.