SOAR Playbook Designer¶
Security Orchestration, Automation, and Response (SOAR) platforms transform manual incident response into repeatable, automated workflows. The difference between a 4-hour mean time to respond and a 4-minute one often comes down to whether your team has pre-built playbooks ready to execute when alerts fire.
This interactive designer lets you build IR automation playbooks visually by adding workflow nodes — triggers, decisions, actions, enrichments, and human review gates — then connecting them into executable sequences. Load one of three pre-built templates or design your own from scratch, then export the result as YAML for import into your SOAR platform of choice.
Companion Resources
- Incident Response Lifecycle — foundational IR phases and processes
- Detection Engineering at Scale — building the detection pipeline that feeds SOAR
- Detection-as-Code Pipeline — CI/CD for detection rules
- SOC Metrics Cheat Sheet — MTTD, MTTR, and automation rate tracking
Properties
Select a node on the canvas to edit its properties.
Export
Pre-Built Playbook Templates¶
Use the Load Template buttons above to instantly populate the canvas with one of these battle-tested IR workflows. Each template follows industry best practices and can be customized for your environment.
1. Phishing Response Playbook¶
Objective: Detect, analyze, contain, and remediate phishing attacks with minimal analyst intervention.
| Step | Type | Action | Automation Level |
|---|---|---|---|
| 1 | Trigger | Email gateway or user report triggers playbook | Fully automated |
| 2 | Enrichment | Parse headers — SPF, DKIM, DMARC validation | Fully automated |
| 3 | Enrichment | URL reputation via threat intel feeds | Fully automated |
| 4 | Decision | Score malicious indicators against threshold | Automated with tunable threshold |
| 5 | Enrichment | Sandbox detonation for attachments | Fully automated |
| 6 | Action | Quarantine email from all mailboxes | Fully automated |
| 7 | Action | Block sender domain at gateway | Fully automated |
| 8 | Human Review | L2 analyst confirms containment actions | Manual gate |
| 9 | Action | Send awareness notification to affected users | Fully automated |
| 10 | Close | Document findings, update threat intel, close case | Semi-automated |
Key metrics target: MTTD < 2 min | MTTR < 15 min | Automation rate: 80%
Detection Engineering Tie-In
The trigger for this playbook connects to email-based detection rules covered in Detection Engineering at Scale. Ensure your SIEM correlation rules for phishing indicators are tuned before deploying this playbook.
2. Malware Alert Playbook¶
Objective: Respond to EDR malware detections with automated containment, forensic preservation, and eradication.
| Step | Type | Action | Automation Level |
|---|---|---|---|
| 1 | Trigger | EDR alert for suspicious binary execution | Fully automated |
| 2 | Enrichment | Hash lookup via VirusTotal and internal TI | Fully automated |
| 3 | Decision | Known malware signature match check | Automated |
| 4 | Action | Network-isolate the affected endpoint | Fully automated |
| 5 | Action | Capture VM snapshot for forensics | Fully automated |
| 6 | Human Review | L3 analyst performs memory/disk forensics | Manual (time-boxed) |
| 7 | Action | Eradicate malware and persistence mechanisms | Semi-automated |
| 8 | Action | Restore from clean backup or reimage | Semi-automated |
| 9 | Action | Create incident ticket in ServiceNow | Fully automated |
| 10 | Close | Confirm eradication and close case | Semi-automated |
Key metrics target: MTTD < 1 min | MTTR < 45 min | Automation rate: 70%
Containment First
Always isolate before investigating. The playbook prioritizes containment (Step 4) before forensic analysis (Step 6) to limit blast radius. See Incident Response Lifecycle for the full containment-before-investigation rationale.
3. Brute Force Response Playbook¶
Objective: Detect credential-based attacks, block malicious sources, protect targeted accounts, and prevent lateral movement.
| Step | Type | Action | Automation Level |
|---|---|---|---|
| 1 | Trigger | SIEM correlation: N failed logins in M minutes | Fully automated |
| 2 | Enrichment | Source IP reputation and ASN lookup | Fully automated |
| 3 | Enrichment | GeoIP location of source address | Fully automated |
| 4 | Decision | External vs. internal source determination | Automated |
| 5 | Action | Block source IP at perimeter firewall | Fully automated |
| 6 | Decision | Check if any login attempts succeeded | Automated |
| 7 | Action | Lock the targeted user account | Fully automated |
| 8 | Action | Force password reset | Fully automated |
| 9 | Human Review | SOC manager reviews for escalation | Manual gate |
| 10 | Action | Notify account owner via Slack | Fully automated |
| 11 | Close | Document and close brute force incident | Semi-automated |
Key metrics target: MTTD < 3 min | MTTR < 20 min | Automation rate: 82%
SOAR Integration Reference¶
Deploying playbooks requires integration with your SOAR platform. Below is a reference for the four most widely adopted platforms.
Splunk SOAR (formerly Phantom)¶
| Feature | Details |
|---|---|
| Playbook Format | Visual Playbook Editor or Python playbooks |
| Trigger Mechanism | Ingestion via SIEM alerts, email, REST API |
| Key Integrations | 300+ apps in Splunkbase |
| Automation Language | Python 3 custom functions |
| Deployment Model | On-premises or cloud (Splunk SOAR Cloud) |
| Strengths | Deep Splunk SIEM integration, large app ecosystem |
# Example Splunk SOAR playbook trigger configuration
phantom_playbook:
name: "phishing_response_v2"
trigger:
type: "artifact"
conditions:
- field: "cef.emailSubject"
operator: "contains"
value: "urgent"
- field: "severity"
operator: ">="
value: "medium"
actions:
- app: "VirusTotal"
action: "url reputation"
parameters:
url: "artifact:*.cef.requestURL"
Cortex XSOAR (Palo Alto)¶
| Feature | Details |
|---|---|
| Playbook Format | Visual drag-and-drop + YAML |
| Trigger Mechanism | Incidents from integrations, fetch-incidents |
| Key Integrations | 700+ content packs in XSOAR Marketplace |
| Automation Language | Python 3, JavaScript |
| Deployment Model | On-premises, cloud, or hosted (XSOAR SaaS) |
| Strengths | Largest integration marketplace, War Room collaboration |
# Example XSOAR playbook task definition
tasks:
"0":
id: "0"
taskid: "isolate-endpoint"
type: regular
task:
name: "Isolate Endpoint"
script: "CrowdStrikeFalcon|||isolate-host"
scriptarguments:
hostname: ${incident.hostname}
nexttasks:
'#none#':
- "1"
Tines¶
| Feature | Details |
|---|---|
| Playbook Format | Stories (visual node-based workflows) |
| Trigger Mechanism | Webhooks, scheduled, email, RSS |
| Key Integrations | No-code HTTP request actions (any API) |
| Automation Language | No-code / low-code (Liquid templating) |
| Deployment Model | Cloud-native SaaS |
| Strengths | No-code approach, flexible API integrations, free community edition |
{
"name": "Check IP Reputation",
"type": "HTTP Request",
"method": "GET",
"url": "https://www.virustotal.com/api/v3/ip_addresses/{{.receive_alert.body.source_ip}}",
"headers": {
"x-apikey": "{{.CREDENTIAL.virustotal_api_key}}"
}
}
Shuffle¶
| Feature | Details |
|---|---|
| Playbook Format | Visual workflow editor |
| Trigger Mechanism | Webhooks, schedules, subflows |
| Key Integrations | OpenAPI-based app framework |
| Automation Language | Python apps, no-code workflows |
| Deployment Model | Open-source self-hosted or cloud |
| Strengths | Open-source, OpenAPI auto-integration, cost-effective |
# Example Shuffle workflow trigger
triggers:
- name: "SIEM Webhook"
type: "webhook"
environment: "production"
parameters:
auth_required: true
auth_type: "header"
actions:
- name: "Enrich IOC"
app: "VirusTotal"
action: "get_hash_report"
parameters:
hash: "$trigger.body.file_hash"
Platform Comparison Matrix¶
| Capability | Splunk SOAR | Cortex XSOAR | Tines | Shuffle |
|---|---|---|---|---|
| Visual playbook builder | Yes | Yes | Yes | Yes |
| Code-based playbooks | Python | Python/JS | Liquid | Python |
| Integration count | 300+ | 700+ | Any API | OpenAPI |
| Case management | Built-in | Built-in | External | External |
| Threat intel mgmt | Via apps | TIM module | Via APIs | Via apps |
| Pricing model | Per-action | Per-endpoint | Per-story run | Free/Cloud |
| Open source | No | No | No | Yes |
| Best for | Splunk shops | Enterprise SOC | Lean teams | Budget-conscious |
Playbook Design Best Practices¶
1. Start with the Incident Lifecycle¶
Map every playbook to the NIST IR lifecycle phases covered in Incident Response Lifecycle:
- Preparation — Ensure integrations and credentials are configured
- Detection & Analysis — Trigger + Enrichment nodes
- Containment — Action nodes with isolation/blocking capabilities
- Eradication & Recovery — Action nodes for cleanup and restoration
- Post-Incident — Close node with lessons-learned documentation
2. Human-in-the-Loop vs. Full Automation¶
Not every action should be automated. Use this decision framework:
| Criteria | Automate | Human Gate |
|---|---|---|
| Reversibility | Easily reversible (block IP) | Hard to reverse (wipe endpoint) |
| Blast radius | Single asset | Multiple assets or business-critical |
| Confidence | High-fidelity detection (>95%) | Low-fidelity or new rule (<80%) |
| Impact | Low business impact | Customer-facing or revenue-impacting |
| Compliance | No regulatory requirement | Regulatory approval needed |
3. Design Patterns¶
- Linear Pipeline
- Simple sequential execution. Best for straightforward, single-path incidents. Example: alert → enrich → contain → close.
- Decision Tree
- Branching logic based on enrichment results. Best for incidents that require different responses based on severity, asset type, or IOC confidence. Example: the Brute Force playbook branches on external vs. internal source.
- Parallel Fan-Out
- Multiple enrichment or action nodes execute simultaneously. Best for reducing MTTR when actions are independent. Example: simultaneously query VirusTotal, Shodan, and WHOIS.
- Escalation Ladder
- Progressive escalation through analyst tiers with SLA-based auto-escalation. Best for ensuring incidents do not stall. Include timeout-based automatic escalation at every human review gate.
4. Error Handling¶
Every production playbook needs error handling:
- Retry logic — Transient API failures should retry 3 times with exponential backoff
- Timeout handling — Every action node needs a timeout; default to 300 seconds
- Fallback paths — If automated containment fails, route to human review
- Dead letter queue — Failed playbook runs should be captured for review, not silently dropped
5. Testing and Validation¶
Test Before You Need It
Run every playbook against synthetic data before it handles a real incident. Schedule monthly playbook dry-runs as part of your tabletop exercises.
- Unit test individual actions with synthetic IOCs (use RFC 5737 IPs:
192.0.2.0/24,198.51.100.0/24,203.0.113.0/24) - Integration test the full workflow end-to-end in a staging environment
- Load test with bulk alerts to verify the playbook handles alert storms
- Regression test after every SOAR platform upgrade or integration change
Metrics: Measuring Playbook Effectiveness¶
Track these metrics to quantify the value of your SOAR investment:
Mean Time to Detect (MTTD)¶
Time from attack occurrence to alert generation. SOAR does not directly reduce MTTD — that is the domain of Detection Engineering — but automated enrichment reduces the time from alert to confirmed detection.
| Maturity Level | MTTD Target | How to Achieve |
|---|---|---|
| Ad-hoc | Hours to days | Manual log review |
| Defined | 15-60 minutes | SIEM correlation rules |
| Managed | 1-15 minutes | Automated detection + enrichment |
| Optimized | < 1 minute | ML-assisted detection + auto-triage |
Mean Time to Respond (MTTR)¶
Time from detection to containment. This is where SOAR delivers the most value.
| Maturity Level | MTTR Target | How to Achieve |
|---|---|---|
| Ad-hoc | Hours to days | Manual response, tribal knowledge |
| Defined | 1-4 hours | Documented playbooks, manual execution |
| Managed | 15-60 minutes | Semi-automated playbooks |
| Optimized | < 15 minutes | Fully automated SOAR playbooks |
Automation Rate¶
Percentage of incident response actions executed without human intervention.
Automation Rate = (Automated Actions / Total Actions) x 100
Target by maturity:
- Initial: 10-25% (enrichment only)
- Developing: 25-50% (enrichment + low-risk containment)
- Advanced: 50-75% (full containment + some eradication)
- Elite: 75-90% (full lifecycle, humans for edge cases only)
Playbook Execution Metrics¶
| Metric | Description | Target |
|---|---|---|
| Playbook trigger rate | How often each playbook fires per week | Track trend |
| Success rate | % of runs completing without error | > 95% |
| False positive rate | % of runs that were unnecessary | < 20% |
| Human override rate | % of automated decisions overridden by analysts | < 10% |
| Mean execution time | Average wall-clock time per playbook run | Track trend |
SOAR Architecture Considerations¶
Data Flow Architecture¶
┌──────────────┐
│ Alert Sources│
│ SIEM / EDR │
│ Email / API │
└──────┬───────┘
│
┌──────▼───────┐
│ SOAR Engine │
│ Orchestrator │
└──────┬───────┘
│
┌────────────┼────────────┐
│ │ │
┌──────▼──┐ ┌──────▼──┐ ┌─────▼───┐
│ Enrich │ │ Contain │ │ Notify │
│ VT/WHOIS│ │ EDR/FW │ │ Slack │
└─────────┘ └─────────┘ └─────────┘
Integration Authentication¶
| Method | Use Case | Security Level |
|---|---|---|
| API Key | Simple integrations (VirusTotal, Shodan) | Basic |
| OAuth 2.0 | Cloud services (M365, Google Workspace) | Strong |
| Service Account | On-prem systems (Active Directory) | Strong |
| Certificate | Mutual TLS for sensitive integrations | Strongest |
| Vault Integration | All credentials via HashiCorp Vault or AWS Secrets Manager | Best practice |
Credential Management
Never hardcode API keys or credentials in playbook definitions. All SOAR platforms support credential vaults — use them. Rotate all integration credentials on a 90-day cycle at minimum.
Playbook Versioning and Lifecycle¶
Treat playbooks as code. Apply the same rigor you use for detection rules (see Detection-as-Code Pipeline):
| Phase | Activity | Tooling |
|---|---|---|
| Develop | Build playbook in staging environment | SOAR visual editor or YAML |
| Review | Peer review by senior analyst | Pull request / change request |
| Test | Execute against synthetic incidents | SOAR test mode with mock data |
| Deploy | Promote to production | CI/CD pipeline or manual promotion |
| Monitor | Track execution metrics and errors | SOAR dashboards + SIEM |
| Retire | Deprecate outdated playbooks | Archive with documentation |
Common Playbook Anti-Patterns¶
Avoid these mistakes that undermine SOAR effectiveness:
- Over-Automation Without Guardrails
- Automating destructive actions (account deletion, full network isolation) without confidence thresholds or human approval gates leads to self-inflicted outages. Always gate high-impact actions behind a confidence score or human review node.
- Monolithic Playbooks
- A single 50-step playbook that handles every edge case becomes unmaintainable. Break complex workflows into modular sub-playbooks that can be reused across multiple parent playbooks.
- Ignoring False Positive Tuning
- If a playbook fires 100 times per day and 90 are false positives, analysts learn to ignore it. Build feedback loops: when an analyst marks a run as false positive, the tuning data should flow back to the detection rule.
- No Timeout or SLA Enforcement
- Human review gates without SLA timers create bottlenecks. Every human node should have an escalation path that triggers automatically when the SLA is breached.
- Hardcoded Values
- IP addresses, hostnames, and thresholds should be variables, not hardcoded strings. Use playbook input parameters and environment-specific configuration to keep playbooks portable across environments.
Playbook Documentation Template¶
Every production playbook should have accompanying documentation:
# Playbook Documentation Template
playbook_meta:
name: "Playbook Name"
id: "PB-001"
version: "1.2"
status: "Production" # Draft | Review | Production | Deprecated
owner: "SOC Team"
last_updated: "2026-03-24"
review_cycle: "Quarterly"
# Purpose and scope
purpose: "Brief description of what this playbook automates"
trigger_conditions: "What alerts or events initiate this playbook"
scope: "What incident types this playbook covers"
out_of_scope: "What this playbook does NOT handle"
# Dependencies
integrations_required:
- name: "CrowdStrike Falcon"
purpose: "Endpoint isolation and forensic data collection"
credentials: "vault://soar/crowdstrike-api"
- name: "VirusTotal"
purpose: "Hash and URL reputation lookups"
credentials: "vault://soar/virustotal-key"
# SLAs
sla:
initial_triage: "5 minutes"
containment: "15 minutes"
full_resolution: "4 hours"
# Change history
changelog:
- version: "1.2"
date: "2026-03-24"
author: "analyst@example.com"
changes: "Added sandbox detonation step"
- version: "1.1"
date: "2026-03-10"
author: "analyst@example.com"
changes: "Updated VirusTotal API to v3"
Cross-References¶
This tool connects to several Nexus SecOps resources:
| Resource | Relevance |
|---|---|
| Incident Response Lifecycle | IR phases that map to playbook structure |
| Detection Engineering at Scale | Detection rules that trigger SOAR playbooks |
| Detection-as-Code Pipeline | CI/CD for the detection rules feeding your SOAR |
| SOC Metrics Cheat Sheet | MTTD, MTTR, and operational metrics |
| ATT&CK Technique Reference | Mapping playbooks to adversary techniques |
| Purple Team Exercise Library | Testing playbooks with adversary emulation |
| Attack Path Builder | Understanding attack chains your playbooks must counter |
Certification Alignment¶
SOAR playbook design and incident response automation are covered extensively in these industry certifications:
Recommended Certifications
GIAC Certified Incident Handler (GCIH) Covers the incident handling process, detection, and response techniques that form the foundation of SOAR playbook design. Learn more about GCIH
CompTIA Cybersecurity Analyst (CySA+) Focuses on detection, analysis, and response — the three pillars automated by SOAR platforms. Covers SIEM operations, threat intelligence, and incident response. Learn more about CySA+
Splunk Certified SOC Analyst Vendor-specific certification covering Splunk SIEM and SOAR operations, including playbook creation and automation workflows.
Palo Alto XSOAR Certified Analyst Vendor-specific certification for Cortex XSOAR playbook development, integration management, and incident lifecycle automation.
All data in this tool is synthetic and for educational purposes only. IP addresses use RFC 5737 and RFC 1918 ranges. No real credentials, infrastructure, or threat data is referenced. See Incident Response Lifecycle for foundational IR concepts.