SOT

SOT

SOAR
Security Orchestration, Automation and Response

Automation of response to information security incidents using dynamic playbooks and information security tools, building an attack chain and with an object-oriented approach

NG SOAR
Next Generation SOAR

Automation of response to information security incidents with built-in basic correlation (SIEM), vulnerability Scanner (VS), collection of raw events directly from information security tools, dynamic playbooks, building an attack chain and an object-oriented approach. AM and VM are included

AM
Asset Management

Description of the IT landscape, detection of new objects on the network, categorization of assets, inventory, life cycle management of equipment and software on automated workstations and servers of organizations

VS
Vulnerability Scanner

Scanning information assets with enrichment from any external services (additional scanners, The Data Security Threats Database and other analytical databases) to analyze the security of the infrastructure.

VM
Vulnerability Management

Building a process for detecting and eliminating technical vulnerabilities, collecting information from existing security scanners, update management platforms, expert external services and other solutions

FinCERT
Financial Computer Emergency Response Team

Bilateral interaction with the Central Bank, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

GovCERT
Government Computer Emergency Response Team

Bilateral interaction with the state coordination center for computer incidents, namely the transfer of information about incidents and receipt of prompt notifications/bulletins from the regulator

Mail us to sales@securityvision.ru or get demo presentation

Cybersecurity incident response scenarios. Part 1. Study guides, playbooks, and SOP

Cybersecurity incident response scenarios. Part 1. Study guides, playbooks, and SOP
06.10.2025

Ruslan Rakhmetov, Security Vision


Incident response scenarios are formalized, documented step—by-step procedures and strategies aimed at timely detection, deterrence, and elimination of cyber threats, as well as post-incident analysis and training.


Table of contents
1. Introduction to Standardized Operating Procedures (SOP)
2. What is a runbook and its role in SOC
3. Playbook: a strategic response model
4. The operating pyramid: the connection of SOP, runbooks and playbooks
5. Response frameworks: NIST and PICERL
6. Communication during a crisis
7. Incident resolution criteria
8. Dynamic response scenarios in Security Vision SOAR


In today's cybersecurity ecosystem, response scenarios are not just a checklist, but a formalized, documented collection of strategies, techniques, and reproducible step-by-step processes. They guide the actions of the security team in responding to specific incidents.


Standard Operating Procedures (SOP) are the most granular level, representing detailed, step—by-step instructions for performing a specific, routine and predictable task. The purpose of SOP is to ensure absolute consistency, quality, and compliance with regulatory requirements when performing repetitive operations. Deviations from the procedure are not expected: for example, a SOP for creating a new user account with minimal privileges and a SOP for applying a critical security update on a web server.


A runbook is a detailed guide to performing a specific, often complex, but well—known and repeatable operational process from start to finish: it focuses on the "how to do" aspect and can include both manual and automated steps. A runbook can cover more complex scenarios with multiple stages and decision points. For example, the process of isolating a compromised endpoint or restoring a database from a secure backup.


A runbook can be compared to a checklist that you use to prepare your home for winter: the process includes several separate steps (draining water from pipes, closing vents, checking the boiler), but in general it is predictable and runs on schedule.


A playbook is a higher—level, strategic process that describes a set of responses, actions, and areas of responsibility for responding to a specific scenario or incident, which can be dynamic and unpredictable. Playbook focuses on strategy and decision-making in a given context, rather than prescribing each individual action: it answers questions about what should be done and why, often referring to several playbooks to achieve its goals. For example, the process of responding to a phishing attack or deterring a ransomware attack.


A playbook is like a plan that you mentally (or on paper) draw up in case of a house fire. It is not about routine and is dedicated to responding to an emergency. He answers the questions: Who brings out the children? Who's calling 911? where will the residents of the house meet on the street?


The operating pyramid


These documents form an operational pyramid. SOPs, as fundamental "building blocks", are formed into runbooks — structures built to perform routine operations. And a playbook is a comprehensive emergency plan that can refer to specific runbooks or SOPs in the course of its execution. For example, a playbook for responding to hacking of a supervisor's account can activate a runbook for blocking access, which, in turn, includes a SOP for changing the password.


Organizations build their operational resilience from the bottom up: from simple instructions to comprehensive crisis response strategies. Security Vision products can help automate these processes by solving several tasks at once:


 •  Standardization and consistency so that each analyst, regardless of their level of experience, follows uniform, proven procedures for a specific type of incident. This ensures consistency and predictability of actions, maintaining a high quality of response at all levels (without such an approach, response often occurs intuitively, which leads to chaos, missed steps and, ultimately, to greater damage to the organization).

 •  Operational efficiency; a clear, actionable scenario that allows the analyst team to respond quickly and effectively to various cyber threats. In conditions where minutes count, the presence of a predefined algorithm of actions dramatically reduces the time from detection to threat neutralization, which is critically important for the mission of the Security Operations Center (SOC).

 •  Increasing maturity and optimization is the basis for moving from reactive, situational responses to a structured, optimized and measurable security model. An organization that cannot formulate a consistent playbook for a widespread threat most likely does not have a holistic strategy to deal with this threat.

 •  Creating a vibrant and intelligent repository of institutional knowledge, capturing best practices, proven methodologies, and, most importantly, lessons learned from past incidents to guide future actions. This prevents the loss of valuable experience during staff changes and ensures continuous improvement of response processes.


Response frameworks


The structure of scenarios, logic, and sequence of actions are directly derived from established, industry-recognized incident response methodologies. Therefore, advanced frameworks from the National Institute of Standards and Technology (NIST) and the SANS Institute are used.

1. The cyclic NIST process


a. Preparation

Proactive phase: development of policies and response plans, team building (CERT, CSIRT), deployment and configuration of tools (SIEM, SOAR, EDR), staff training. At this stage, playbooks are being developed and tested for various types of threats.


b. Detection and Analysis

Identification of an incident based on indicators, analysis of scale and impact, documentation of findings. This stage serves as the main trigger for activating the corresponding playbook.


c. Containment, Eradication, & Recovery

Isolate the infected host, remove the threat from the infrastructure, restore systems from clean backups, and verify their security.


d. Post-Incident Activity

Analyzing response effectiveness, documenting lessons, and updating playbooks and procedures.


2. The six-step PICERL (SANS) process


a. Preparation

Focus on policies, tools, and team readiness.


b. Identification

Comparable to NIST detection and analysis.


c. Containment

Isolation of affected systems.


d. Elimination (Eradication)

Elimination of the root cause and all artifacts of the incident.


e. Recovery

Return systems to normal operation from trusted backups.


f. Lessons Learned

Post-incident analysis and process improvement.


Communication during a crisis


Communication is not spontaneous, but carefully planned: scenarios determine who (internal teams, management, legal department, HR, external partners, regulators, clients), when (at what stages and with what frequency) to notify, and what to report (by mail or in an embedded chat).


Incident resolution criteria


The scenarios define what is considered a "resolution" of the incident: full system recovery, vulnerability removal, confirmation of the absence of threats, and official closure of the incident. A clear definition of the ultimate goal helps the team bring the process to its logical conclusion.


Dynamic response scenarios in Security Vision SOAR


In the following publications, we will look at how the Security Vision SOAR product implements flexible and automated response scenarios that optimize all the described processes.


FAQ


What is SOP in cybersecurity?
Standard operating procedure, detailed instructions for routine tasks.


What is the difference between a playbook and a playbook?
The playbok focuses on step—by-step execution; the playbook focuses on strategic decision-making.


Why do I need playbooks in SOC?
To ensure consistency and rapid response to incidents.


What phases does the NIST response framework include?
Preparation, detection and analysis, containment/eradication/recovery, post-incident activity.


What does PICERL mean in the SANS methodology?
Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned.


How to organize communication in case of an incident?
Identify those responsible, channels, frequency of notifications, and message content.


When is the incident considered resolved?
After the systems are restored, vulnerabilities are fixed, and the official closure is completed.


Why do I need script automation in SOAR?
To speed up the response and minimize the human factor.


How to build an operational pyramid in a company?
Put the SOPs in the runbooks, and the runbooks in the playbooks.


What does feedback include after an incident?

Performance analysis, learning lessons, and updating playbooks.