Overview
UTMStack’s Security Orchestration, Automation, and Response (SOAR) capabilities enable security teams to automate repetitive tasks, accelerate incident response, and orchestrate complex workflows across security tools. The SOAR platform is accessible at/soar and integrates with alerts, incidents, and external systems via /integrations.
Automated Playbooks
Pre-built and custom workflows for common security scenarios
Alert Orchestration
Automatically enrich and respond to alerts from
/iframeIncident Response
Streamline response to incidents from
/incidentIntegration Hub
Connect security tools via
/integrationsSOAR Components
Core Elements
Playbooks
Automated workflows that execute a series of actions
Actions
Individual tasks performed by playbooks (query, block, notify)
Triggers
Events that initiate playbook execution (alerts, schedules)
Variables
Dynamic values used in playbooks from
/variablesConditions
Logic that controls playbook flow and decision-making
Integrations
Connected tools and systems from
/integrationsPlaybook Structure
Playbooks consist of:- Trigger - What initiates the playbook
- Inputs - Data provided to the playbook (IOCs, incident details)
- Actions - Steps executed by the playbook
- Conditions - Decision points and branching logic
- Outputs - Results returned by the playbook
- Error Handling - What happens if actions fail
Common Use Cases
Alert Enrichment
Automatically enhance alerts from/iframe with additional context:
Phishing Response
Automate response to phishing emails:Extract Indicators
Parse email for:
- Sender address and headers
- URLs and domains
- Attachments and file hashes
Analyze Attachments
- Submit files to sandbox for analysis
- Extract file hashes and scan with antivirus
Containment Actions
- Delete phishing emails from all mailboxes
- Block sender at email gateway
- Add URLs to web proxy blocklist
Malware Response
Automate malware incident response:Collect Forensics
- Capture memory dump
- Collect process list and network connections
- Gather file artifacts
Threat Intelligence
- Query
/threat-intelligencefor known malware family - Submit samples to malware analysis platforms
Block IOCs
Add indicators to blocklists:
- Firewall rules for C2 IPs
- Proxy blocks for C2 domains
- Endpoint blocklists for file hashes
Account Compromise
Automate response to compromised user accounts:Verify Legitimacy
- Check login location against user baseline
- Compare with user’s normal login times
- Review recent user activity in
/discover
Immediate Containment
If confirmed malicious:
- Force password reset
- Revoke all active sessions
- Disable account temporarily
Investigate Activity
- Review all account activity during compromise window
- Check for data access or exfiltration
- Identify other affected accounts
Reset Access
- Reset password via
/active-directory - Revoke API tokens and service credentials
- Require MFA re-enrollment
Building Playbooks
Playbook Design
Define Objective
Clearly state what the playbook should accomplish (e.g., “Respond to phishing emails”)
Design Workflow
Create flowchart of:
- Actions to perform
- Decision points
- Error handling
- Output requirements
Action Types
Enrichment Actions
- Threat intelligence lookups
- WHOIS/DNS queries
- Asset database searches
- User directory queries
Investigation Actions
- Log searches via
/discover - File analysis and sandboxing
- Network traffic analysis
- Endpoint queries
Containment Actions
- Network isolation
- Account disablement
- Firewall rule updates
- Endpoint quarantine
Notification Actions
- Email notifications
- Slack/Teams messages
- SMS alerts
- Ticket creation
Remediation Actions
- File deletion
- Registry key cleanup
- Service termination
- Patch deployment
Documentation Actions
- Create incidents at
/incident - Update alerts at
/iframe - Generate reports
- Update knowledge base
Conditional Logic
Playbooks can include decision-making:Error Handling
Implement robust error handling:Retry Logic
Retry failed actions with exponential backoff
Fallback Actions
Alternative actions if primary fails
Notifications
Alert on playbook failures
Logging
Detailed logging of all actions and errors
Integration Management
Available Integrations
Connect SOAR to tools via/integrations:
Security Tools
- Firewalls and IPS/IDS
- EDR/XDR platforms
- Email security gateways
- SIEM systems
Threat Intelligence
- Commercial TI feeds
- OSINT sources
- MISP and TI platforms
- Sandbox services
IT Systems
- Active Directory (via
/active-directory) - Asset management (via
/data-sources) - Ticketing systems
- CMDB platforms
Communication
- Email (SMTP)
- Slack
- Microsoft Teams
- SMS/paging systems
Configuring Integrations
Automation Variables
Variable Management
Manage automation variables at/variables:
Configuration Values
- API endpoints
- Timeout values
- Retry counts
- Thresholds
Credentials
- API keys (encrypted)
- Passwords (encrypted)
- Tokens
- Certificates
Lists
- Whitelisted IPs
- Approved domains
- Critical assets
- VIP users
Dynamic Data
- Playbook outputs
- Shared state
- Temporary data
- Cache values
Variable Best Practices
- Use Variables for Configurability - Avoid hardcoding values in playbooks
- Encrypt Sensitive Data - Always encrypt credentials and secrets
- Descriptive Names - Use clear, consistent naming conventions
- Document Purpose - Add descriptions for all variables
- Version Control - Track variable changes over time
- Regular Audits - Review and remove unused variables
Playbook Triggers
Trigger Types
Alert Triggers
Execute when specific alerts fire from
/iframeIncident Triggers
Launch when incidents are created at
/incidentSchedule Triggers
Run on a schedule (daily, weekly, hourly)
Manual Triggers
Analyst-initiated playbook execution
Webhook Triggers
External system calls trigger playbook
Event Triggers
Specific log events from
/discover trigger executionTrigger Configuration
Define Conditions
Specify conditions that must be met:
- Alert severity level
- Incident category
- Time of day
- Asset criticality
Playbook Execution
Execution Modes
Fully Automated
Playbook runs without human intervention
Semi-Automated
Analyst approval required at key decision points
Advisory Only
Playbook provides recommendations, analyst executes
Simulation
Test mode that doesn’t execute actual actions
Monitoring Execution
Pre-built Playbooks
Alert Response Playbooks
Alert Triage and Enrichment
Alert Triage and Enrichment
- Extract IOCs from alert
- Query threat intelligence at
/threat-intelligence - Lookup asset information from
/data-sources - Search for related alerts
- Calculate priority score
- Assign to appropriate queue
False Positive Suppression
False Positive Suppression
- Identify recurring false positive patterns
- Update allow lists
- Modify alert rules at
/alerting-rules - Document in knowledge base
Threat Response Playbooks
IOC Blocking
IOC Blocking
- Receive IOC (IP, domain, hash, URL)
- Validate IOC via threat intelligence
- Block at multiple control points:
- Firewall rules
- Proxy/web filter
- EDR/endpoint protection
- Email gateway
- Document block action
- Create alert rule at
/alerting-rulesfor detection
Lateral Movement Detection
Lateral Movement Detection
- Detect suspicious lateral movement activity
- Map affected systems
- Check for additional compromised accounts
- Contain spread by isolating affected systems
- Collect forensic evidence
- Create incident at
/incident
Compliance Playbooks
Access Review Automation
Access Review Automation
- Extract user access lists
- Identify excessive permissions
- Flag dormant accounts
- Generate review reports
- Track via compliance at
/compliance
Policy Violation Response
Policy Violation Response
- Detect policy violation
- Gather evidence from
/discover - Notify responsible party
- Create compliance incident
- Track remediation
Performance and Optimization
Playbook Metrics
Track playbook effectiveness:Execution Time
Average time for playbook to complete
Success Rate
Percentage of successful executions
Resource Usage
CPU, memory, and API call consumption
Time Saved
Manual effort eliminated by automation
Error Rate
Frequency of playbook failures
ROI
Value delivered vs development cost
Optimization Strategies
Governance and Control
Playbook Approval Workflow
Access Controls
Implement SOAR access controls via/management:
- Playbook Execution - Who can run playbooks manually
- Playbook Creation - Who can create new playbooks
- Playbook Editing - Who can modify existing playbooks
- Integration Access - Which playbooks can use which integrations
- Approval Rights - Who can approve high-risk playbooks
Best Practices
Development
- Start Simple - Begin with basic workflows and add complexity gradually
- Reuse Components - Build libraries of common actions
- Version Control - Track all playbook changes
- Test Thoroughly - Test with various inputs and edge cases
- Document Everything - Clear documentation of purpose and usage
- Error Handling - Always include proper error handling
- Idempotency - Ensure playbooks can safely run multiple times
Operations
- Monitor Performance - Track execution metrics regularly
- Review Logs - Regularly review playbook execution logs
- Update Regularly - Keep playbooks current with evolving threats
- Gradual Automation - Move from manual to semi-automated to fully automated
- Maintain Integrations - Keep integration credentials and configs current
- Regular Audits - Quarterly review of all active playbooks
Security
Least Privilege
Grant minimum permissions necessary for playbooks
Credential Security
Encrypt all credentials in
/variablesAudit Logging
Log all playbook executions and actions
Change Control
Require approval for playbook changes
Measuring SOAR Success
Key Metrics
| Metric | Target | Description |
|---|---|---|
| Alert MTTR | -50% | Reduce mean time to respond to alerts |
| Analyst Time Saved | 20+ hrs/week | Hours freed from manual tasks |
| Playbook Success Rate | >95% | Percentage of successful executions |
| Incident MTTR | -40% | Faster incident response with automation |
| Coverage | 80% | Percentage of common scenarios automated |
| False Positive Reduction | -30% | Automated enrichment reduces FPs |
ROI Calculation
Related Resources
Integrations
Connect tools for playbook orchestration
Automation Variables
Manage playbook variables and secrets
Alert Management
Source of alert-triggered playbooks
Incident Response
Automate incident response workflows