The Detection of Anomalies is dependent on the point of comparison, or a collection of standards into a baseline. The impact of a threat, as it relates to the established standards, which is required to determine the presence of anomalies, hinges upon the effects of the two consistent variables in the environment: the standards and the events. You see, standards/controls have been defined and implemented as a point of comparison or a baseline of "what right looks like," and void of that comparison or baseline, we are re‐actively trying to control cyber threat, and frankly losing the fight. A suggested foundation for Detecting Cyber Anomalies is illustrated below in three steps.
ACATEE is designed to understand and prioritize threat as it relates to the integrity of the controls implemented within your environment. Also, ACATEE can provide you with the pre-established templates and tools to build your controls and baselines (Step 1 above), although honestly, so can several other software products. What makes ACATEE unique are Steps 2 and 3 listed in the image.
Focused remediation requires AI-assisted prioritization and understanding of events occurring in the environment, preferrablly as it relates to your baseline or ATO.
All of the events in the environment are important, although, they need to be prioritized. The strength of your cyber st