Skip to content

SOAR Playbook Designer

Security Orchestration, Automation, and Response (SOAR) platforms transform manual incident response into repeatable, automated workflows. The difference between a 4-hour mean time to respond and a 4-minute one often comes down to whether your team has pre-built playbooks ready to execute when alerts fire.

This interactive designer lets you build IR automation playbooks visually by adding workflow nodes — triggers, decisions, actions, enrichments, and human review gates — then connecting them into executable sequences. Load one of three pre-built templates or design your own from scratch, then export the result as YAML for import into your SOAR platform of choice.

Companion Resources


Load Template:

Node Palette

Click a node type to add it to the canvas.

Connections

Click two nodes on the canvas to connect them. First click = source, second click = target.

0 nodes

Properties

Select a node on the canvas to edit its properties.

Export

  

Pre-Built Playbook Templates

Use the Load Template buttons above to instantly populate the canvas with one of these battle-tested IR workflows. Each template follows industry best practices and can be customized for your environment.

1. Phishing Response Playbook

Objective: Detect, analyze, contain, and remediate phishing attacks with minimal analyst intervention.

Step Type Action Automation Level
1 Trigger Email gateway or user report triggers playbook Fully automated
2 Enrichment Parse headers — SPF, DKIM, DMARC validation Fully automated
3 Enrichment URL reputation via threat intel feeds Fully automated
4 Decision Score malicious indicators against threshold Automated with tunable threshold
5 Enrichment Sandbox detonation for attachments Fully automated
6 Action Quarantine email from all mailboxes Fully automated
7 Action Block sender domain at gateway Fully automated
8 Human Review L2 analyst confirms containment actions Manual gate
9 Action Send awareness notification to affected users Fully automated
10 Close Document findings, update threat intel, close case Semi-automated

Key metrics target: MTTD < 2 min | MTTR < 15 min | Automation rate: 80%

Detection Engineering Tie-In

The trigger for this playbook connects to email-based detection rules covered in Detection Engineering at Scale. Ensure your SIEM correlation rules for phishing indicators are tuned before deploying this playbook.


2. Malware Alert Playbook

Objective: Respond to EDR malware detections with automated containment, forensic preservation, and eradication.

Step Type Action Automation Level
1 Trigger EDR alert for suspicious binary execution Fully automated
2 Enrichment Hash lookup via VirusTotal and internal TI Fully automated
3 Decision Known malware signature match check Automated
4 Action Network-isolate the affected endpoint Fully automated
5 Action Capture VM snapshot for forensics Fully automated
6 Human Review L3 analyst performs memory/disk forensics Manual (time-boxed)
7 Action Eradicate malware and persistence mechanisms Semi-automated
8 Action Restore from clean backup or reimage Semi-automated
9 Action Create incident ticket in ServiceNow Fully automated
10 Close Confirm eradication and close case Semi-automated

Key metrics target: MTTD < 1 min | MTTR < 45 min | Automation rate: 70%

Containment First

Always isolate before investigating. The playbook prioritizes containment (Step 4) before forensic analysis (Step 6) to limit blast radius. See Incident Response Lifecycle for the full containment-before-investigation rationale.


3. Brute Force Response Playbook

Objective: Detect credential-based attacks, block malicious sources, protect targeted accounts, and prevent lateral movement.

Step Type Action Automation Level
1 Trigger SIEM correlation: N failed logins in M minutes Fully automated
2 Enrichment Source IP reputation and ASN lookup Fully automated
3 Enrichment GeoIP location of source address Fully automated
4 Decision External vs. internal source determination Automated
5 Action Block source IP at perimeter firewall Fully automated
6 Decision Check if any login attempts succeeded Automated
7 Action Lock the targeted user account Fully automated
8 Action Force password reset Fully automated
9 Human Review SOC manager reviews for escalation Manual gate
10 Action Notify account owner via Slack Fully automated
11 Close Document and close brute force incident Semi-automated

Key metrics target: MTTD < 3 min | MTTR < 20 min | Automation rate: 82%


SOAR Integration Reference

Deploying playbooks requires integration with your SOAR platform. Below is a reference for the four most widely adopted platforms.

Splunk SOAR (formerly Phantom)

Feature Details
Playbook Format Visual Playbook Editor or Python playbooks
Trigger Mechanism Ingestion via SIEM alerts, email, REST API
Key Integrations 300+ apps in Splunkbase
Automation Language Python 3 custom functions
Deployment Model On-premises or cloud (Splunk SOAR Cloud)
Strengths Deep Splunk SIEM integration, large app ecosystem
# Example Splunk SOAR playbook trigger configuration
phantom_playbook:
  name: "phishing_response_v2"
  trigger:
    type: "artifact"
    conditions:
      - field: "cef.emailSubject"
        operator: "contains"
        value: "urgent"
      - field: "severity"
        operator: ">="
        value: "medium"
  actions:
    - app: "VirusTotal"
      action: "url reputation"
      parameters:
        url: "artifact:*.cef.requestURL"

Cortex XSOAR (Palo Alto)

Feature Details
Playbook Format Visual drag-and-drop + YAML
Trigger Mechanism Incidents from integrations, fetch-incidents
Key Integrations 700+ content packs in XSOAR Marketplace
Automation Language Python 3, JavaScript
Deployment Model On-premises, cloud, or hosted (XSOAR SaaS)
Strengths Largest integration marketplace, War Room collaboration
# Example XSOAR playbook task definition
tasks:
  "0":
    id: "0"
    taskid: "isolate-endpoint"
    type: regular
    task:
      name: "Isolate Endpoint"
      script: "CrowdStrikeFalcon|||isolate-host"
    scriptarguments:
      hostname: ${incident.hostname}
    nexttasks:
      '#none#':
        - "1"

Tines

Feature Details
Playbook Format Stories (visual node-based workflows)
Trigger Mechanism Webhooks, scheduled, email, RSS
Key Integrations No-code HTTP request actions (any API)
Automation Language No-code / low-code (Liquid templating)
Deployment Model Cloud-native SaaS
Strengths No-code approach, flexible API integrations, free community edition
{
  "name": "Check IP Reputation",
  "type": "HTTP Request",
  "method": "GET",
  "url": "https://www.virustotal.com/api/v3/ip_addresses/{{.receive_alert.body.source_ip}}",
  "headers": {
    "x-apikey": "{{.CREDENTIAL.virustotal_api_key}}"
  }
}

Shuffle

Feature Details
Playbook Format Visual workflow editor
Trigger Mechanism Webhooks, schedules, subflows
Key Integrations OpenAPI-based app framework
Automation Language Python apps, no-code workflows
Deployment Model Open-source self-hosted or cloud
Strengths Open-source, OpenAPI auto-integration, cost-effective
# Example Shuffle workflow trigger
triggers:
  - name: "SIEM Webhook"
    type: "webhook"
    environment: "production"
    parameters:
      auth_required: true
      auth_type: "header"
actions:
  - name: "Enrich IOC"
    app: "VirusTotal"
    action: "get_hash_report"
    parameters:
      hash: "$trigger.body.file_hash"

Platform Comparison Matrix

Capability Splunk SOAR Cortex XSOAR Tines Shuffle
Visual playbook builder Yes Yes Yes Yes
Code-based playbooks Python Python/JS Liquid Python
Integration count 300+ 700+ Any API OpenAPI
Case management Built-in Built-in External External
Threat intel mgmt Via apps TIM module Via APIs Via apps
Pricing model Per-action Per-endpoint Per-story run Free/Cloud
Open source No No No Yes
Best for Splunk shops Enterprise SOC Lean teams Budget-conscious

Playbook Design Best Practices

1. Start with the Incident Lifecycle

Map every playbook to the NIST IR lifecycle phases covered in Incident Response Lifecycle:

  • Preparation — Ensure integrations and credentials are configured
  • Detection & Analysis — Trigger + Enrichment nodes
  • Containment — Action nodes with isolation/blocking capabilities
  • Eradication & Recovery — Action nodes for cleanup and restoration
  • Post-Incident — Close node with lessons-learned documentation

2. Human-in-the-Loop vs. Full Automation

Not every action should be automated. Use this decision framework:

Criteria Automate Human Gate
Reversibility Easily reversible (block IP) Hard to reverse (wipe endpoint)
Blast radius Single asset Multiple assets or business-critical
Confidence High-fidelity detection (>95%) Low-fidelity or new rule (<80%)
Impact Low business impact Customer-facing or revenue-impacting
Compliance No regulatory requirement Regulatory approval needed

3. Design Patterns

Linear Pipeline
Simple sequential execution. Best for straightforward, single-path incidents. Example: alert → enrich → contain → close.
Decision Tree
Branching logic based on enrichment results. Best for incidents that require different responses based on severity, asset type, or IOC confidence. Example: the Brute Force playbook branches on external vs. internal source.
Parallel Fan-Out
Multiple enrichment or action nodes execute simultaneously. Best for reducing MTTR when actions are independent. Example: simultaneously query VirusTotal, Shodan, and WHOIS.
Escalation Ladder
Progressive escalation through analyst tiers with SLA-based auto-escalation. Best for ensuring incidents do not stall. Include timeout-based automatic escalation at every human review gate.

4. Error Handling

Every production playbook needs error handling:

  • Retry logic — Transient API failures should retry 3 times with exponential backoff
  • Timeout handling — Every action node needs a timeout; default to 300 seconds
  • Fallback paths — If automated containment fails, route to human review
  • Dead letter queue — Failed playbook runs should be captured for review, not silently dropped

5. Testing and Validation

Test Before You Need It

Run every playbook against synthetic data before it handles a real incident. Schedule monthly playbook dry-runs as part of your tabletop exercises.

  • Unit test individual actions with synthetic IOCs (use RFC 5737 IPs: 192.0.2.0/24, 198.51.100.0/24, 203.0.113.0/24)
  • Integration test the full workflow end-to-end in a staging environment
  • Load test with bulk alerts to verify the playbook handles alert storms
  • Regression test after every SOAR platform upgrade or integration change

Metrics: Measuring Playbook Effectiveness

Track these metrics to quantify the value of your SOAR investment:

Mean Time to Detect (MTTD)

Time from attack occurrence to alert generation. SOAR does not directly reduce MTTD — that is the domain of Detection Engineering — but automated enrichment reduces the time from alert to confirmed detection.

Maturity Level MTTD Target How to Achieve
Ad-hoc Hours to days Manual log review
Defined 15-60 minutes SIEM correlation rules
Managed 1-15 minutes Automated detection + enrichment
Optimized < 1 minute ML-assisted detection + auto-triage

Mean Time to Respond (MTTR)

Time from detection to containment. This is where SOAR delivers the most value.

Maturity Level MTTR Target How to Achieve
Ad-hoc Hours to days Manual response, tribal knowledge
Defined 1-4 hours Documented playbooks, manual execution
Managed 15-60 minutes Semi-automated playbooks
Optimized < 15 minutes Fully automated SOAR playbooks

Automation Rate

Percentage of incident response actions executed without human intervention.

Automation Rate = (Automated Actions / Total Actions) x 100

Target by maturity:
  - Initial:    10-25%  (enrichment only)
  - Developing: 25-50%  (enrichment + low-risk containment)
  - Advanced:   50-75%  (full containment + some eradication)
  - Elite:      75-90%  (full lifecycle, humans for edge cases only)

Playbook Execution Metrics

Metric Description Target
Playbook trigger rate How often each playbook fires per week Track trend
Success rate % of runs completing without error > 95%
False positive rate % of runs that were unnecessary < 20%
Human override rate % of automated decisions overridden by analysts < 10%
Mean execution time Average wall-clock time per playbook run Track trend

SOAR Architecture Considerations

Data Flow Architecture

                    ┌──────────────┐
                    │  Alert Sources│
                    │  SIEM / EDR   │
                    │  Email / API  │
                    └──────┬───────┘
                    ┌──────▼───────┐
                    │  SOAR Engine  │
                    │  Orchestrator │
                    └──────┬───────┘
              ┌────────────┼────────────┐
              │            │            │
       ┌──────▼──┐  ┌──────▼──┐  ┌─────▼───┐
       │ Enrich  │  │ Contain │  │ Notify  │
       │ VT/WHOIS│  │ EDR/FW  │  │ Slack   │
       └─────────┘  └─────────┘  └─────────┘

Integration Authentication

Method Use Case Security Level
API Key Simple integrations (VirusTotal, Shodan) Basic
OAuth 2.0 Cloud services (M365, Google Workspace) Strong
Service Account On-prem systems (Active Directory) Strong
Certificate Mutual TLS for sensitive integrations Strongest
Vault Integration All credentials via HashiCorp Vault or AWS Secrets Manager Best practice

Credential Management

Never hardcode API keys or credentials in playbook definitions. All SOAR platforms support credential vaults — use them. Rotate all integration credentials on a 90-day cycle at minimum.

Playbook Versioning and Lifecycle

Treat playbooks as code. Apply the same rigor you use for detection rules (see Detection-as-Code Pipeline):

Phase Activity Tooling
Develop Build playbook in staging environment SOAR visual editor or YAML
Review Peer review by senior analyst Pull request / change request
Test Execute against synthetic incidents SOAR test mode with mock data
Deploy Promote to production CI/CD pipeline or manual promotion
Monitor Track execution metrics and errors SOAR dashboards + SIEM
Retire Deprecate outdated playbooks Archive with documentation

Common Playbook Anti-Patterns

Avoid these mistakes that undermine SOAR effectiveness:

Over-Automation Without Guardrails
Automating destructive actions (account deletion, full network isolation) without confidence thresholds or human approval gates leads to self-inflicted outages. Always gate high-impact actions behind a confidence score or human review node.
Monolithic Playbooks
A single 50-step playbook that handles every edge case becomes unmaintainable. Break complex workflows into modular sub-playbooks that can be reused across multiple parent playbooks.
Ignoring False Positive Tuning
If a playbook fires 100 times per day and 90 are false positives, analysts learn to ignore it. Build feedback loops: when an analyst marks a run as false positive, the tuning data should flow back to the detection rule.
No Timeout or SLA Enforcement
Human review gates without SLA timers create bottlenecks. Every human node should have an escalation path that triggers automatically when the SLA is breached.
Hardcoded Values
IP addresses, hostnames, and thresholds should be variables, not hardcoded strings. Use playbook input parameters and environment-specific configuration to keep playbooks portable across environments.

Playbook Documentation Template

Every production playbook should have accompanying documentation:

# Playbook Documentation Template
playbook_meta:
  name: "Playbook Name"
  id: "PB-001"
  version: "1.2"
  status: "Production"  # Draft | Review | Production | Deprecated
  owner: "SOC Team"
  last_updated: "2026-03-24"
  review_cycle: "Quarterly"

  # Purpose and scope
  purpose: "Brief description of what this playbook automates"
  trigger_conditions: "What alerts or events initiate this playbook"
  scope: "What incident types this playbook covers"
  out_of_scope: "What this playbook does NOT handle"

  # Dependencies
  integrations_required:
    - name: "CrowdStrike Falcon"
      purpose: "Endpoint isolation and forensic data collection"
      credentials: "vault://soar/crowdstrike-api"
    - name: "VirusTotal"
      purpose: "Hash and URL reputation lookups"
      credentials: "vault://soar/virustotal-key"

  # SLAs
  sla:
    initial_triage: "5 minutes"
    containment: "15 minutes"
    full_resolution: "4 hours"

  # Change history
  changelog:
    - version: "1.2"
      date: "2026-03-24"
      author: "analyst@example.com"
      changes: "Added sandbox detonation step"
    - version: "1.1"
      date: "2026-03-10"
      author: "analyst@example.com"
      changes: "Updated VirusTotal API to v3"

Cross-References

This tool connects to several Nexus SecOps resources:

Resource Relevance
Incident Response Lifecycle IR phases that map to playbook structure
Detection Engineering at Scale Detection rules that trigger SOAR playbooks
Detection-as-Code Pipeline CI/CD for the detection rules feeding your SOAR
SOC Metrics Cheat Sheet MTTD, MTTR, and operational metrics
ATT&CK Technique Reference Mapping playbooks to adversary techniques
Purple Team Exercise Library Testing playbooks with adversary emulation
Attack Path Builder Understanding attack chains your playbooks must counter

Certification Alignment

SOAR playbook design and incident response automation are covered extensively in these industry certifications:

Recommended Certifications

GIAC Certified Incident Handler (GCIH) Covers the incident handling process, detection, and response techniques that form the foundation of SOAR playbook design. Learn more about GCIH

CompTIA Cybersecurity Analyst (CySA+) Focuses on detection, analysis, and response — the three pillars automated by SOAR platforms. Covers SIEM operations, threat intelligence, and incident response. Learn more about CySA+

Splunk Certified SOC Analyst Vendor-specific certification covering Splunk SIEM and SOAR operations, including playbook creation and automation workflows.

Palo Alto XSOAR Certified Analyst Vendor-specific certification for Cortex XSOAR playbook development, integration management, and incident lifecycle automation.


All data in this tool is synthetic and for educational purposes only. IP addresses use RFC 5737 and RFC 1918 ranges. No real credentials, infrastructure, or threat data is referenced. See Incident Response Lifecycle for foundational IR concepts.