The safety business has spent the final yr speaking about fashions, copilots, and brokers, however a quieter shift is going on one layer under all of that: Distributors are lining up round a shared technique to describe safety information. The Open Cybersecurity Schema Framework (OCSF), is rising as one of many strongest candidates for that job.
It provides distributors, enterprises, and practitioners a typical technique to characterize safety occasions, findings, objects, and context. Which means much less time rewriting area names and customized parsers and extra time correlating detections, operating analytics, and constructing workflows that may work throughout merchandise. In a market the place each safety group is stitching collectively endpoint, id, cloud, SaaS, and AI telemetry, a typical infrastructure lengthy felt like a pipe dream, and OCSF now places it inside attain.
OCSF in plain language
OCSF is an open-source framework for cybersecurity schemas. It’s vendor impartial by design and intentionally agnostic to storage format, information assortment, and ETL decisions. In sensible phrases, it provides utility groups and information engineers a shared construction for occasions so analysts can work with a extra constant language for risk detection and investigation.
That sounds dry till you take a look at the each day work inside a safety operations middle (SOC). Safety groups have to spend so much of effort normalizing information from completely different instruments in order that they’ll correlate occasions. For instance, detecting an worker logging in from San Francisco at 10 a.m. on their laptop computer, then accessing a cloud useful resource from New York at 10:02 a.m. may reveal a leaked credential.
Organising a system that may correlate these occasions, nevertheless, is not any straightforward process: Totally different instruments describe the identical thought with completely different fields, nesting constructions, and assumptions. OCSF was constructed to decrease this tax. It helps distributors map their very own schemas into a typical mannequin and helps prospects transfer information by lakes, pipelines, safety incident and occasion administration (SIEM) instruments with out requiring time consuming translation at each hop.
The final two years have been unusually quick
Most of OCSF’s seen acceleration has occurred within the final two years. The mission was introduced in August 2022 by Amazon AWS and Splunk, constructing on labored contributed by Symantec, Broadcom, and different well-known infrastructure giants Cloudflare, CrowdStrike, IBM, Okta, Palo Alto Networks, Rapid7, Salesforce, Securonix, Sumo Logic, Tanium, Pattern Micro, and Zscaler.
The OCSF group has saved up a gentle cadence of releases over the past two years
The group has grown shortly. AWS stated in August 2024 that OCSF had expanded from a 17-company initiative right into a group with greater than 200 taking part organizations and 800 contributors, which expanded to 900 wen OCSF joined the Linux Basis in November 2024.
OCSF is exhibiting up throughout the business
Within the observability and safety house, OCSF is in all places. AWS Safety Lake converts natively supported AWS logs and occasions into OCSF and shops them in Parquet. AWS AppFabric can output OCSF — normalized audit information. AWS Safety Hub findings use OCSF, and AWS publishes an extension for cloud-specific useful resource particulars.
Splunk can translate incoming information into OCSF with edge processor and ingest processor. Cribl helps seamless changing streaming information into OCSF and appropriate codecs.
Palo Alto Networks can ahead Strata sogging Service information into Amazon Safety Lake in OCSF. CrowdStrike positions itself on either side of the OCSF pipe, with Falcon information translated into OCSF for Safety Lake and Falcon Subsequent-Gen SIEM positioned to ingest and parse OCSF-formatted information. OCSF is a kind of uncommon requirements that has crossed the chasm from an summary normal into normal operational plumbing throughout the business.
AI is giving the OCSF story recent urgency
When enterprises deploy AI infrastructure, giant language fashions (LLMs) sit on the core, surrounded by advanced distributed techniques resembling mannequin gateways, agent runtimes, vector shops, device calls, retrieval techniques, and coverage engines. These parts generate new types of telemetry, a lot of which spans product boundaries. Safety groups throughout the SOC are more and more centered on capturing and analyzing this information. The central query usually turns into what an agentic AI system really did, slightly than solely the textual content it produced, and whether or not its actions led to any safety breaches.
That places extra strain on the underlying information mannequin. An AI assistant that calls the incorrect device, retrieves the incorrect information, or chains collectively a dangerous sequence of actions creates a safety occasion that must be understood throughout techniques. A shared safety schema turns into extra precious in that world, particularly when AI can also be getting used on the analytics facet to correlate extra information, sooner.
For OCSF, 2025 was all about AI
Think about an organization makes use of an AI assistant to assist staff lookup inner paperwork and set off instruments like ticketing techniques or code repositories. In the future, the assistant begins pulling the incorrect recordsdata, calling instruments it mustn’t use, and exposing delicate data in its responses.
Updates in OCSF variations 1.5.0, 1.6.0, and 1.7.0 assist safety groups piece collectively what occurred by flagging uncommon conduct, exhibiting who had entry to the related techniques, and tracing the assistant’s device calls step-by-step. As a substitute of solely seeing the ultimate reply the AI gave, the group can examine the complete chain of actions that led to the issue.
What's on the horizon
Think about an organization makes use of an AI buyer help bot, and sooner or later the bot begins giving lengthy, detailed solutions that embrace inner troubleshooting steering meant just for workers. With the sorts of adjustments being developed for OCSF 1.8.0, the safety group may see which mannequin dealt with the change, which supplier equipped it, what function every message performed, and the way the token counts modified throughout the dialog.
A sudden spike in immediate or completion tokens may sign that the bot was fed an unusually giant hidden immediate, pulled in an excessive amount of background information from a vector database, or generated a very lengthy response that elevated the possibility of delicate data leaking. That provides investigators a sensible clue about the place the interplay went astray, as a substitute of leaving them with solely the ultimate reply.
Why this issues to the broader market
The larger story is that OCSF has moved shortly from being a group effort to turning into an actual normal that safety merchandise use on daily basis. Over the previous two years, it has gained stronger governance, frequent releases, and sensible help throughout information lakes, ingest pipelines, SIEM workflows, and companion ecosystems.
In a world the place AI expands the safety panorama by scams, abuse, and new assault paths, safety groups depend on OCSF to attach information from many techniques with out shedding context alongside the way in which to maintain your information secure.
Nikhil Mungel has been constructing distributed techniques and AI groups at SaaS firms for greater than 15 years.

