<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Declarations of Compromise®: Cutting Through the Noise to Pinpoint Serious and Imminent Threats

Security teams are often overwhelmed by a flood of alerts, leading to alert fatigue and missed critical incidents. But what if you could cut through the noise and pinpoint the most serious and imminent threats to your organization? This is where Declarations of Compromise (DoC) from Clear NDR come into play.

What is a Declaration of Compromise (DoC)?

A DoC is a high-fidelity, asset-oriented security incident event generated by Clear NDR. It's designed to provide a clear starting point for investigation by identifying true organizational compromises with near-zero false positives. Think of it as a confident "declaration" that a serious threat, such as malware, lateral movement, or an advanced persistent threat (APT), has been detected against a specific asset in your network.

The Power of DoC: Noise Reduction and Actionable Intelligence

Traditional security monitoring often generates millions of network events. DoCs dramatically reduce this alert fatigue by transforming that vast amount of data into focused, actionable incidents. While Clear NDR collects extensive network metadata and discrete threat detections, DoCs simplify the incident responder's job by highlighting only the most critical events.

DoC-Pyramid-Stamus-Networks-Branded

Each DoC maps to specific phases of the cyber security kill chain, providing a complete attack timeline from initial compromise through full blast radius analysis. This means you not only know what happened but also how the attack progressed and which assets are affected.

Key Characteristics of DoCs:

  • Asset-oriented: Each DoC is associated with a single asset, with all evidence and insights linked to it.
  • High confidence, high-fidelity: DoCs are triggered only under conditions of an active incident, ensuring accuracy.
  • Low noise: While Clear NDR logs repeated detections, only the first one generates a DoC, preventing redundant alerts.
  • Effective with UI or SIEM: DoC events contain comprehensive information, making them valuable whether you use the Clear NDR UI or a SIEM integration.
  • Built-in and/or customized: Stamus Networks provides extensive built-in detections, updated daily, and Clear NDR allows users to create custom DoC rules through an "escalation" process.

Automating Your Response

DoCs are not just about detection; they're about action. They can seamlessly integrate with your existing security infrastructure through SIEM integrations and automated response capabilities via API integrations. This enables automated workflows like:

  • Opening incident response (IR) tickets
  • Isolating offending endpoints
  • Blocking malicious IP addresses
  • Initiating SOAR playbooks
  • Sending instant messages to your security team

Transforming Security Operations

Declarations of Compromise represent a paradigm shift from reactive alert processing to proactive incident management. By giving security personnel precise, high-confidence starting points and comprehensive evidence, DoCs empower teams to focus their expertise on genuine threats, significantly enhancing the efficiency and effectiveness of modern cybersecurity operations.

Further Reading

For a more in-depth understanding, read our full Tech Brief on Declarations of Compromise and Declarations of Policy Violations on our website: https://www.stamus-networks.com/hubfs/Library/Documents%20(PDFs)/StamusNetworks-TB-FILTERS-072025-1.pdf 

To learn how analysts can pivot from a DoC to a complete package of evidence in two clicks, check out this blog entitled “Two Clicks to Evidence,” here: https://www.stamus-networks.com/blog/reduce-mean-time-to-detection-2-clicks-to-evidence-with-clear-ndr 

 To understand how Clear NDR can dramatically reduce the costs associated with retaining network forensic evidence, read these two docs:

 

Phil Owens

Phil is the vice president of customer solutions at Stamus Networks. He has over 25 years experience in IT, networking, and cyber security. As a Systems Engineer he has been a trusted advisor to several fortune 500 companies. As a product manager he has created successful cyber security software products. Prior to joining Stamus Networks he held positions at RSA Security, AT&T and IBM. Phil is also proud to have served in the United States Air Force. Phil resides in Florida, USA.

Schedule a Demo of Clear NDR

REQUEST A DEMO

Related posts

Uncovered: Real-Time Policy Violation Detection in a Zero Trust Environment

Modern IT infrastructure, whether traditional or hybrid, faces persistent challenges: staff...

Uncovered: Uncovering Risk Exposure from Publicly Accessible Unauthenticated TFTP

One of the significant advantages of Clear NDR’s multi-layered detection is its ability to identify...

Production Ready Suricata Language Server (SLS) 1.0 is now Available

Suricata Language Server (SLS) has been available for more than 3 years, and it has always been...