Skip to content

Amazon Security Lake is now generally available

Amazon Security Lake is now generally available
Posted On: May 30, 2023
Today, AWS announces the general availability of Amazon Security Lake. This service automatically centralizes security data from AWS environments, SaaS providers, on-premises environments, and cloud sources into a purpose-built data lake stored in your account... 
Security Lake has adopted the Open Cybersecurity Schema Framework (OCSF), an open standard. With OCSF support, the service normalizes and combines security data from AWS and a broad range of enterprise security data sources. “


The key takeaway here is the Adaptation of OCSF , which really complements the trend  as we try to forge ahead with the hybrid model and utilise multiple tools from various vendors in organisations cloud journey. Essentially it means we all speak the same language without the need for normalising the data or in other words unshackling the vendor lock-in. 

But What’ is Open Cybersecurity Schema Framework (OCSF) ?

Currently various vendors use XML (Extensible Markup Language), JSON (JavaScript Object Notation) , Log Event Extended Format (LEEF) developed by IBM , Common Event Format (CEF) developed by ArcSight (now part of Micro Focus) and Syslog. Which Makes collaboration or migration between two separate tools or vendors complicated.

The cybersecurity community has been working together to develop a standardized way for expressing and distributing cybersecurity-related information. The framework is intended to solve the issue of interoperability and information exchange among diverse cybersecurity technologies, systems, and organizations.

The Open Cybersecurity Schema Framework has the following advantages:


OCSF provides a standard schema and data model that enable various cybersecurity tools, platforms, and systems to successfully communicate information. Organizations that adhere to the OCSF may more effectively integrate and interoperate their security systems, enabling improved collaboration and coordinated responses to cyberattacks.

Sharing of Cybersecurity Information

The framework encourages the exchange of cybersecurity information across various stakeholders, such as threat intelligence providers, security vendors, government agencies, and security operations centers. It simplifies the distribution and consumption of actionable insights, threat information, and indicators of compromise (IOCs) by facilitating the uniform encoding of data


OCSF supports the integration of many cybersecurity tools and systems, such as SIEM platforms, intrusion detection and prevention systems (IDPS), threat intelligence platforms (TIP), and others. By harnessing the capabilities of numerous products in a unified manner, this integration simplifies workflows, increases automation, and improves the overall security posture.

Scalability and Extensibility

The framework is meant to be scalable and extensible, allowing for the addition of new data types, features, and connections as the cybersecurity landscape changes. This versatility means that OCSF can embrace new threats, technologies, and needs without causing substantial interruptions or requiring a total rewrite.

Community cooperation

By offering a shared framework for defining, verifying, and improving cybersecurity standards, the OCSF facilitates cooperation among industry professionals, organizations, and researchers. The participatory method invites contributions and comments, ensuring that the framework stays relevant and successful in solving real-world cybersecurity concerns.


By implementing the OCSF, Organisations may strengthen their cybersecurity capabilities, boost information exchange, and construct more powerful defences against cyberattacks. The standardisation of data representation allows for improved integration, interoperability, and cooperation throughout the cybersecurity ecosystem, eventually leading to a more secure digital environment.

About the Author


Sachin is a Cloud and an IT expert with a vast experience in Systems , Security and Integration.

Leave a Reply

Your email address will not be published. Required fields are marked *