Chapter 3: Scenarios & Selection

Eight industry application scenarios with real-world deployment context, key technical metrics, and selection guidance

Cybersecurity monitoring requirements vary significantly across industries due to differences in regulatory obligations, threat landscape, asset criticality, and operational constraints. This chapter presents eight representative deployment scenarios that collectively cover the most common enterprise environments. Each scenario is described with its operational context, primary threats, recommended monitoring coverage, and key technical performance indicators that serve as design targets and acceptance criteria.

1

Financial Institution — Transaction Security & Fraud Monitoring

Financial Institution SOC
Figure 3.1: Financial Institution Security Operations Center — Real-time transaction monitoring, SWIFT payment flow analysis, fraud detection dashboards, and global threat intelligence integration.

Financial institutions operate under the most stringent regulatory requirements of any industry, with obligations spanning PCI DSS, SOX, DORA, and local banking regulations. The monitoring system must provide real-time visibility into payment transactions, SWIFT messaging, core banking API calls, and privileged access to financial data. Fraud detection requires sub-second correlation between transaction events and behavioral baselines, while compliance monitoring demands complete audit trails with tamper-evident storage.

The primary threat vectors include account takeover via credential stuffing, insider trading through privileged data access, SWIFT fraud through compromised messaging systems, and ransomware targeting core banking infrastructure. The monitoring architecture must support both real-time detection for fraud prevention and forensic investigation for regulatory reporting.

<100msFraud Alert Latency
99.99%Monitoring Uptime
7 yearsLog Retention
<0.1%False Positive Rate
100%SWIFT Coverage
<15minIncident MTTD
Monitoring DomainKey SourcesPrimary DetectionsCompliance Mapping
Payment TransactionsCore banking API, payment gateway logsAnomalous transaction patterns, velocity abusePCI DSS Req. 10
SWIFT MessagingSWIFT Alliance logs, MQ monitoringUnauthorized message injection, operator abuseSWIFT CSP
Privileged AccessPAM logs, AD events, database auditOff-hours access, data exfiltration, privilege escalationSOX IT Controls
Endpoint & WorkstationEDR, DLP, email gatewayMalware, phishing, data stagingDORA ICT Risk
2

Energy & Utilities — ICS/SCADA Critical Infrastructure Protection

Energy Sector ICS Security
Figure 3.2: Energy Sector ICS/SCADA Security Operations — Power grid topology monitoring, OT/IT network security, substation protection alerts, and industrial control system anomaly detection.

Energy and utility operators face a unique challenge: their operational technology (OT) environments were designed for reliability and safety, not security. Legacy SCADA systems, industrial protocols (Modbus, DNP3, IEC 61850), and air-gapped network assumptions create monitoring blind spots that nation-state actors and ransomware groups actively exploit. The monitoring architecture must bridge the IT/OT divide without disrupting operational continuity, using passive network monitoring and protocol-aware inspection rather than active scanning.

The Purdue Model provides the logical segmentation framework, with monitoring deployed at the IT/OT demilitarized zone (DMZ) to capture all cross-boundary traffic. Industrial protocol anomaly detection identifies unauthorized command sequences, unexpected device communications, and configuration changes that could indicate pre-attack reconnaissance or sabotage preparation.

ZeroOT Disruption
<5minAnomaly Detection
100%IT/OT Boundary Coverage
PassiveOT Monitoring Mode
NERC CIPCompliance Framework
IEC 62443Security Standard
OT ZoneMonitoring ApproachKey DetectionsConstraint
Level 0-1 (Field Devices)Passive protocol analysis via span portUnauthorized commands, rogue devicesNo active scanning; zero packet injection
Level 2 (Control)HMI/SCADA log collection, protocol monitoringConfig changes, operator anomaliesRead-only access to historian
IT/OT DMZ (Level 3.5)Full traffic inspection, firewall logsLateral movement, data exfiltrationStrict change control for DMZ rules
Corporate IT (Level 4-5)Standard SIEM integrationPhishing, credential theft targeting OTSeparate SIEM instance for OT data
3

Large Enterprise — Multi-Site Unified Security Operations

Enterprise Multi-Site SOC
Figure 3.3: Global Enterprise Security Operations — Multi-site network topology with headquarters and international branches, lateral movement detection, IAM monitoring, and unified SIEM correlation analytics.

Large enterprises with 10,000+ employees and multiple geographic locations require a federated monitoring architecture that provides centralized visibility while respecting data sovereignty, bandwidth constraints, and regional operational requirements. The hub-and-spoke model with regional collectors and a central SIEM is the standard approach, with local triage capability at major sites and centralized correlation for cross-site attack detection.

The most critical detection use-cases for this scenario are lateral movement across sites, credential compromise and account takeover, data exfiltration through cloud services, and supply chain compromise through vendor access. The monitoring system must correlate events across sites to detect attackers who deliberately spread their activity across multiple locations to evade single-site detection.

50,000+Endpoint Coverage
<30minCross-Site MTTD
24/7SOC Coverage
<5%WAN Bandwidth Impact
100K EPSPeak Ingestion Rate
90 daysHot Storage Retention
Site TypeCollector DeploymentForwarding StrategyLocal Capability
HeadquartersHA collector pair + SIEM nodeDirect to central SIEMFull SOC + SOAR
Regional Hub (>500 users)HA collector pair + regional hubAggregated to central SIEMTier-1 triage
Branch Office (50-500 users)Single collector with disk spoolCompressed to regional hubAlert forwarding only
Small Office (<50 users)Cloud-based collectorDirect to cloud SIEMNone (centralized)
4

Cloud-Native Organization — Multi-Cloud Security Posture Monitoring

Cloud Security Monitoring
Figure 3.4: Multi-Cloud Security Operations — AWS, Azure, and Google Cloud security dashboards, CSPM alerts, cloud workload protection, and unified cloud audit log analysis across multiple cloud providers.

Organizations that have migrated primarily or entirely to cloud infrastructure face a fundamentally different monitoring challenge. The traditional network perimeter is replaced by identity and API boundaries, and the threat model shifts toward misconfiguration exploitation, credential compromise, and abuse of cloud-native services. Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP) capabilities must be integrated into the central SIEM alongside cloud audit logs from all providers.

The monitoring architecture for cloud-native environments must handle the ephemeral nature of cloud resources, where assets are created and destroyed dynamically. Asset inventory must be continuously synchronized from cloud APIs, and detection rules must account for legitimate automation activity to avoid false positive floods from infrastructure-as-code deployments.

3 CloudsMulti-Cloud Coverage
<2minMisconfiguration Alert
100%API Audit Coverage
<5minNew Resource Detection
SOC 2Compliance Framework
Zero TrustArchitecture Model
Cloud LayerTelemetry SourcesKey DetectionsIntegration Method
Identity & AccessIAM logs, SSO events, MFA logsImpossible travel, privilege escalation, token abuseAPI pull via cloud connector
Control PlaneCloudTrail, Activity Log, Audit LogsUnauthorized API calls, resource deletion, policy changesEvent streaming (Kinesis/Event Hub)
Data PlaneVPC Flow Logs, DNS logs, WAF logsData exfiltration, C2 communication, DDoSLog export to central SIEM
WorkloadContainer logs, serverless logs, EDRCrypto mining, container escape, malwareCWPP agent + API integration
5

Government & Defense — National Cybersecurity Monitoring

Government Cybersecurity Operations
Figure 3.5: Government Cybersecurity Operations Center — National threat intelligence mapping, APT group tracking, critical infrastructure protection alerts, and classified network monitoring with multi-level security.

Government and defense organizations face nation-state level adversaries with sophisticated, persistent attack capabilities. The monitoring architecture must support multi-level security (MLS) environments where different classification levels require separate monitoring instances with controlled data sharing. Advanced Persistent Threat (APT) detection requires long-dwell-time behavioral analytics and threat intelligence integration at a depth not required in commercial environments.

The monitoring system must operate in air-gapped or highly restricted network environments, with strict controls on data egress. Threat intelligence sharing with peer agencies and national CERTs requires secure, standardized exchange formats (STIX/TAXII). The system must also support forensic investigations that meet evidentiary standards for criminal prosecution or military legal proceedings.

MLSMulti-Level Security
APTNation-State Detection
STIX/TAXIIIntel Sharing Format
Air-GapNetwork Isolation
10 yearsEvidence Retention
FIPS 140-2Crypto Standard
6

Telecommunications — Network Security & Subscriber Protection

Telecom Network Security Operations
Figure 3.6: Telecommunications NSOC — BGP routing security monitoring, DDoS mitigation dashboards, SS7 signaling security alerts, subscriber data protection, and global network topology visualization.

Telecommunications operators must simultaneously protect their own infrastructure and the communications of millions of subscribers. The monitoring architecture spans both the network operations center (NOC) and security operations center (SOC) functions, with tight integration between network performance monitoring and security event detection. BGP hijacking, SS7 protocol abuse, and DDoS amplification attacks require specialized detection capabilities beyond standard enterprise SIEM.

Subscriber data protection under GDPR, CCPA, and telecommunications-specific regulations requires monitoring of all access to subscriber records, with automated alerts for bulk data access patterns that indicate insider threat or external breach. The monitoring system must handle extremely high event volumes from network infrastructure while maintaining sub-second detection latency for DDoS attacks that can impact service availability.

1M+ EPSPeak Ingestion Rate
<30sDDoS Detection
BGP/SS7Protocol Monitoring
GDPRCompliance Framework
99.999%Service Availability
TbpsTraffic Scale
7

Healthcare — Patient Data Protection & Medical Device Security

Healthcare Cybersecurity Monitoring
Figure 3.7: Healthcare Cybersecurity Operations — Medical device security monitoring, patient data protection dashboards, HIPAA compliance monitoring, ransomware detection and isolation, and hospital network anomaly detection.

Healthcare organizations face a dual imperative: protecting patient data under HIPAA and similar regulations while ensuring the availability and integrity of medical devices that directly affect patient safety. Ransomware attacks on hospitals have demonstrated that cybersecurity failures can have life-threatening consequences, making availability monitoring as critical as threat detection. Medical IoT devices — from infusion pumps to imaging systems — often run legacy operating systems that cannot be patched and must be monitored through network-based detection.

The monitoring architecture must support rapid isolation of ransomware-affected systems without disrupting active patient care systems. Automated response playbooks must include clinical safety checks before executing containment actions, requiring integration with clinical operations teams and clear escalation paths that bypass standard IT approval processes in life-safety situations.

HIPAACompliance Framework
<10minRansomware Isolation
Medical IoTDevice Coverage
ZeroPatient Safety Impact
6 yearsPHI Audit Retention
24/7Clinical Integration
8

Manufacturing — Industrial Cyber Defense & Supply Chain Security

Manufacturing Industrial Cyber Defense
Figure 3.8: Industrial Cyber Defense Center — Factory floor OT network monitoring, Purdue Model network segmentation, production line SCADA security, industrial IoT anomaly detection, and supply chain cyber risk monitoring.

Manufacturing organizations face converging threats from nation-state actors targeting intellectual property, ransomware groups seeking production disruption leverage, and supply chain compromises that can introduce malicious components into products or software. The monitoring architecture must address both the corporate IT environment and the factory floor OT environment, with particular attention to the IT/OT convergence zones where enterprise systems connect to production systems.

Supply chain security monitoring requires tracking software bill of materials (SBOM), monitoring vendor remote access sessions, and detecting anomalous behavior from third-party integrations. Industrial protocol monitoring using Purdue Model segmentation ensures that production systems are protected from IT-side compromises while maintaining the operational visibility needed to detect OT-specific attacks.

IEC 62443OT Security Standard
SBOMSupply Chain Tracking
PurdueNetwork Model
<1%Production Impact
Modbus/DNP3Protocol Coverage
<15minOT Incident MTTD

3.9 Scenario Comparison & Selection Matrix

The following matrix summarizes the key differentiating characteristics across all eight scenarios, enabling practitioners to identify the most relevant reference architecture for their specific deployment context. Multiple scenarios may apply to a single organization — for example, a financial institution with cloud infrastructure should reference both Scenario 1 and Scenario 4.

Scenario Industry Primary Threat Key Regulation Architecture Pattern Complexity
1FinancialFraud, SWIFT attackPCI DSS, DORACentral SIEM + real-time fraud engineHigh
2Energy/UtilitiesNation-state, ransomwareNERC CIP, IEC 62443IT/OT bridge + passive OT monitoringVery High
3Large EnterpriseLateral movement, APTISO 27001, GDPRHub-and-spoke with regional collectorsHigh
4Cloud-NativeMisconfiguration, credentialSOC 2, CSA CCMCloud-native SIEM + CSPM integrationMedium
5GovernmentNation-state APTNIST SP 800-53Air-gapped MLS with intel sharingVery High
6TelecomDDoS, BGP/SS7 abuseGDPR, NIS2High-throughput streaming SIEMVery High
7HealthcareRansomware, PHI breachHIPAA, HITECHClinical-integrated SOC with IoT monitoringHigh
8ManufacturingIP theft, OT disruptionIEC 62443, NIST CSFPurdue-segmented with supply chain monitoringHigh
← Design Methods Chapter 4: Architecture Design →