Security for Legal SaaS

Episode 53 · Module 11 · Monitoring & Incident Response

Monitoring and Alerting Design

19 May 2026 · 8:51 · Security for Legal SaaS

8:51 8:51

You've built your legal SaaS platform with secure authentication, encrypted transport, input validation, and proper access controls. But security is not a static property — it's a continuous process. Attackers don't announce themselves. A credential stuffing attack (automated login attempts using leaked passwords, as covered in Episode 14) generates thousands of failed login events over minutes. A data exfiltration attempt looks like normal API calls until you notice the volume. Without monitoring, you won't detect the attack until a client calls asking why their documents are on the internet.

Today’s Lesson

Security for Legal SaaS — Episode 53: Monitoring and Alerting Design

If Nobody Sees the Alert, It Didn't Fire

You've built your legal SaaS platform with secure authentication, encrypted transport, input validation, and proper access controls. But security is not a static property — it's a continuous process. Attackers don't announce themselves. A credential stuffing attack (automated login attempts using leaked passwords, as covered in Episode 14) generates thousands of failed login events over minutes. A data exfiltration attempt looks like normal API calls until you notice the volume. Without monitoring, you won't detect the attack until a client calls asking why their documents are on the internet.

NIST Cybersecurity Framework 2.0 organises cybersecurity into six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. The Detect function specifically requires "continuous monitoring capabilities to monitor cybersecurity events and verify the effectiveness of protective measures."1 Everything we've covered in this series until now falls under Protect. Starting this episode, we shift to Detect, Respond, and Recover.

What to Monitor for Security

Not all system events are security events. Effective monitoring requires knowing which signals indicate malicious activity versus normal operations.

Authentication Anomalies

Signal What It Might Indicate
Spike in failed login attempts from one IP Credential stuffing or brute-force attack
Successful login from an unusual geography Compromised credentials used from attacker's location
Login followed immediately by bulk data export Account takeover in progress
Multiple MFA failures before a success MFA fatigue attack (as covered in Episode 21)
Login outside business hours with privileged actions Insider threat or compromised admin account

Authorisation Violations

Every time a user tries to access a resource they don't have permission for, that's a data point. One occurrence is probably a UI bug or a misclick. Ten occurrences from the same user in a minute, targeting different client records, is likely an attacker probing for IDOR vulnerabilities (Insecure Direct Object Reference — accessing other users' data by changing identifiers in requests, as covered in Episode 6).

Data Access Patterns

Monitor the volume and pattern of data access. A lawyer reviewing twenty documents in a case file is normal. The same account downloading every document across every client in the system is not. Baseline what normal looks like, and alert on deviations.

API Abuse

Rate limit violations (as covered in Episode 14), unusual API call patterns, requests to endpoints that don't exist (reconnaissance), and sudden spikes in traffic from a single source all warrant monitoring.

Alert Fatigue: The Silent Killer

The biggest threat to monitoring is not insufficient data — it's too much noise. Forrester Research reported that SOC (Security Operations Centre — the team responsible for monitoring and responding to security events) teams received an average of 11,000 alerts per day.2 An ACM Computing Surveys study found that alert fatigue causes security teams to miss up to 30% of alerts — they go uninvestigated or are completely overlooked.3

For a small legal tech team without a dedicated SOC, the risk is even higher. If your monitoring system sends fifty alerts a day and forty-eight are false positives, your team will stop reading them. The two real alerts get buried.

The Target breach lesson: In the 2013 Target data breach, the security monitoring system (FireEye) detected the malware and generated alerts. The SOC team in Bangalore saw the alerts. Nobody acted on them. The breach exposed 40 million credit card numbers. The monitoring worked. The alerting process failed. Alert quality and response processes matter as much as detection capability.

Designing Alerts That Get Acted On

Fewer, higher-fidelity alerts. Modern SIEM systems (Security Information and Event Management — platforms that aggregate logs from multiple sources, correlate events, and generate alerts) aggregate observations across data sources, assign risk scores based on asset criticality and user privilege level, and only escalate when cumulative risk exceeds defined thresholds.4

Contextual enrichment. An alert saying "failed login from 203.0.113.45" is useless. An alert saying "12 failed logins from 203.0.113.45 (Tor exit node, never seen before) targeting admin accounts over 3 minutes" gives the responder enough context to act immediately.

Tiered severity. Not every alert needs the same response:

Severity Example Response
Critical Successful admin login from unknown country Immediate page, force session termination
High Bulk data export exceeding 10x normal volume Page within 15 minutes, investigate
Medium Credential stuffing pattern detected Review within 4 hours, consider IP block
Low Single user accessing more files than usual Log for review in daily security check

SIEM vs. Log Aggregation: Right-Sizing Your Stack

Not every team needs a full SIEM. The decision depends on your scale and complexity.

Log aggregation (tools like the ELK stack — Elasticsearch/Logstash/Kibana — or Grafana Loki) collects and centralises logs from your applications, databases, and infrastructure. You query them manually or write simple alert rules. For a small team with a single application, this is often sufficient.

SIEM adds correlation, behavioural analytics, and automated response. It connects events across sources: "this IP failed to log in five times, then succeeded, then accessed the admin panel, then started downloading documents" — connecting dots that individual log sources can't. Exabeam and Graylog describe how modern SIEMs integrate UEBA (User and Entity Behaviour Analytics — machine learning models that establish baselines of normal behaviour and flag anomalies) to reduce false positives.56

For small legal SaaS teams: Start with structured logging (from Episode 52) feeding into a log aggregation platform. Write alert rules for the high-priority signals: failed login spikes, admin privilege escalation, bulk data access. Graduate to a SIEM when your user base, team size, or compliance requirements demand it. A well-configured log aggregation system with five good alert rules is better than a SIEM nobody has time to tune.

Security-Specific Dashboards

Build dashboards that answer these questions at a glance:

  1. Authentication health: Login success/failure ratio over time. Unusual geography. MFA adoption rate.
  2. Access patterns: Top data-accessing users. Cross-client data access (should be zero for non-admin users). Bulk operations.
  3. API health: Requests per second by endpoint. 4xx/5xx error rates. Rate limit triggers.
  4. Dependency health: Known vulnerabilities in current dependencies. Time since last scan.

These dashboards are not just operational tools — they're evidence. When a client or regulator asks "how do you monitor for security incidents?" you point to the dashboard and the alert history.

On-Call for Security Events

Someone must be responsible for responding to security alerts. For small teams, this doesn't mean a 24/7 security operations centre. It means:

NIST SP 800-61 Revision 3, updated in April 2025, now maps incident response activities directly to the CSF 2.0 functions, providing concrete guidance on detection and response procedures.7

The Monitoring Minimum

Control Purpose
Centralised structured logging Single source of truth for all security events
Authentication event monitoring Detect credential attacks and account compromise
Authorisation violation tracking Detect access control probing and IDOR attempts
Data access volume alerting Detect exfiltration and insider threats
Tiered alert severity Ensure critical events get immediate attention
Named on-call responder Someone is always responsible for acting on alerts
Monthly alert tuning Reduce false positives, update thresholds, add new rules

Monitoring without actionable alerting is just expensive logging. The goal is not to collect data — it's to detect threats fast enough to stop them before they become breaches.

Next episode: what happens when monitoring detects something real — incident response playbooks for when things go wrong.

Sources & references

  1. NIST, Cybersecurity Framework 2.0.
  2. Databahn, The Cybersecurity Alert Fatigue Epidemic.
  3. ACM Computing Surveys, Alert Fatigue in Security Operations Centres: Research Challenges and Opportunities.
  4. Radiant Security, SIEM: Security Information and Event Management Explained — 2026 Guide.
  5. Exabeam, SIEM Alerts: Understanding Security Information and Event Alerts.
  6. Graylog, SIEM Automation to Improve Threat Detection and Incident Response.
  7. NIST, SP 800-61 Revision 3: Incident Response Recommendations and Considerations.
  8. Deepwatch, Modern Security Information and Event Management (SIEM) Strategies.
  9. SearchInform, How SIEM Aligns with NIST, ISO, and Other Cybersecurity Frameworks.
  10. ManageEngine, What Is SIEM? Security Information & Event Management Guide (2026).
  11. Saltycloud / Isora GRC, NIST CSF Functions and Tiers: Complete Guide.