Our use case development process includes:
- Identifying triggers and their relevance to risks
- Breaking down the trigger into stages
- Identifying artefacts associated with these stages
- Developing (and testing) methods of detection
- Implementing the use case
- Monitoring the effectiveness of the newly implemented use case
- Ongoing review and revision of use cases to keep pace with evolving threats
- Aging out use cases when there is no longer a relevant threat associated with the use case