Traditional Security Operations Centers (SOCs) were designed for an era dominated by malware, exploits, and static indicators of compromise. In modern environments shaped by artificial intelligence, cloud-native architectures, and large language models, adversaries increasingly operate through valid actions, legitimate credentials, and authorized interfaces—rendering reactive, alert-centric SOC models insufficient. This work introduces CRED (Cognitive Red Exposure Diagnostic), a cognitive SOC framework grounded in the concept of ∆-Coherence: the sustained divergence between observed behavior and the expected semantic baseline of an identity, considering role, context, and persistence over time. Rather than detecting attacks through signatures or isolated anomalies, CRED models risk as a loss of behavioral coherence, even when individual actions remain technically valid. The framework integrates identity-centric baselining, persistence-aware ∆-scoring, and scenario-level diagnostics informed by modern red team techniques, including LLMjacking, valid credential misuse, GPU/compute abuse, and AI interaction pressure patterns. CRED further introduces a progressive and reversible SOAR governance model, embedding explicit human-in-the-loop controls as a core architectural principle rather than an afterthought. Implemented using widely adopted enterprise observability and SOAR platforms, the framework transforms large volumes of low-signal telemetry into a small number of explainable, actionable narratives. Qualitative evaluation indicates substantial reductions in false positives, earlier pre-impact exposure detection, and improved auditability aligned with regulatory expectations such as LGPD, ISO 27001/27701, and central bank cloud governance requirements. CRED demonstrates a practical and auditable path toward safe automation and cognitive security operations in high-velocity AI environments, reframing the SOC from a reactive alert factory into a system capable of interpreting meaning, coherence, and proportional risk.
Building similarity graph...
Analyzing shared references across papers
Loading...
Eduardo Parra
Building similarity graph...
Analyzing shared references across papers
Loading...
Eduardo Parra (Sun,) studied this question.
www.synapsesocial.com/papers/698acacb7c832249c30ba435 — DOI: https://doi.org/10.5281/zenodo.18525600