Templates created as part of Nigel Boston’s TI Essentials article: "Are we exposed?” The CTI Fusion Playbook for end-to-end exposure validation" | Published March 19, 2026 | feedly.com/ti-essentials/


Alert Contract template

One card per detection. Defines what the detection needs, when to escalate, who owns it, and how often it gets retested. Fill this out when a detection passes validation and enters production.

Detection Name e.g. Credential replay / impossible travel
Technique Mapping e.g. T1078 / Valid Accounts
Severity Critical / High / Medium / Low
Owner Team responsible for this detection
Detection Logic What does this detection do? Describe the triggering conditions and the behavior it identifies. Be specific enough that someone unfamiliar with the rule can understand what fires it.
Required Telemetry Fields List the log fields this detection depends on. If any of these fields stop populating, the detection breaks. e.g. user_principal_name, source_ip, geo_location, timestamp_utc
Data Sources e.g. Azure AD sign-in logs, VPN gateway logs, Okta system log
Escalation Criteria When does this alert get escalated, and to whom? Define the conditions for Tier 2 handoff and incident response activation. Include any exclusions (service accounts, known IP ranges, etc.).
Regression Cadence e.g. Quarterly (BAS + manual)
Last Validated Date of last successful test
Known Limitations What does this detection miss? Document edge cases, false positive sources, environmental constraints, or conditions where the rule degrades. This is the institutional memory that keeps the next person from relearning the hard way.
Version Control v1.0

Exposure Confidence Model template

This resource contains three templates in the same spreadsheet: Exposure Scoring, Gap Registry, and Executive Scorecard.

Gap.png

You can access the template here:

Exposure Confidence Model template