Open Cybersecurity Schema Framework (OCSF) Gains Momentum

What an incredible 8 months it has been. Last August, Splunk, Amazon Web Services (AWS) and 16 other cybersecurity companies launched the Open Cybersecurity Schema Framework (OCSF), an open-source project that provides a common vendor-agnostic taxonomy to simplify and accelerate the ingestion and analysis of security data. Since then, the number of participating organizations has grown more than four-fold, with over 75 companies and 369 individuals, including unaffiliated contributors, involved in OCSF at the time of this writing.

A key development during this period was AWS announcing the Amazon Security Lake, the first service that utilizes OCSF as the data schema foundation. I elaborated on how customers can benefit from Amazon Security Lake’s integration with Splunk in the blog, "Splunk Integrates with Amazon Security Lake to Deliver Analytics Using the Open Cybersecurity Schema Framework."

Additionally, IBM became a Steering Committee member, bringing their extensive experience with industry standards groups and open source projects to the OCSF consortium leadership.

And, importantly, the continued attention and contributions of the OCSF community brought about enhancements to an initial release candidate, helping shape up the latest release candidate RC3. Some members have been writing vendor extensions, with others bringing forward new core classes that can benefit everyone. New capabilities of RC3 include new objects, event classes and categories based on OCSF members’ work with the schema and framework.

I’d like to mention just a few of the enhancements OCSF contributors have made this calendar year:

Let’s zero in on the Security Finding class as another example of RC3 innovation:

For more information on this comprehensive class, take a look at a recent article, OCSF Security Finding and how it can change threat detection from IBM OCSF contributors Irakle Dzneladze and Jason Keirstead.

RC3 is around the corner and is intended to become the stable candidate for a 1.0 GA release after a public review period. Many of the members are already actively implementing applications, for both internal and vendor products, based on the working versions of the schema, which is very exciting. I invite you to check out the latest schema at schema.ocsf.io or download your own schema browser and validation server Docker image at GitHub.com/ocsf. Stay tuned for the public review announcement for RC3!

If you need any additional information or have questions on RC3 and OCSF overall, I encourage you to join the Slack community at info@ocsf.io or send me an inquiry at pagbabian@splunk.com.

Finally, if you’re attending RSA Conference 2023 in San Francisco, be sure to stop by the Splunk booth N-5770 to speak with our experts and check out our latest innovations in security analytics.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.