Runbook: SOC Analyst Standard Workflow Guide#
Objective#
To serve as a central navigational guide for Security Operations Center (SOC) Analysts (primarily Tier 1 and Tier 2), outlining the standard high-level workflow for handling incoming alerts and cases. This runbook directs analysts to the appropriate detailed runbooks for specific tasks like triage, enrichment, investigation, and closure.
Scope#
Provides a high-level overview of the standard alert/case handling process. It links to specific, detailed runbooks for execution steps. It does not contain the detailed execution steps itself but acts as a starting point and process map.
Inputs#
Typically none directly needed to consult this guide. The starting point is usually a new alert or assigned case in the SOAR platform.
Tools#
This guide references workflows that utilize tools across the security stack, primarily:
secops-soar(Case Management, Basic Actions)secops-mcp(SIEM Lookups, Event Search)gti-mcp(Threat Intelligence Enrichment)
Workflow Steps & Diagram#
The standard workflow generally follows these phases. Refer to the linked runbooks for detailed steps and tool usage.
Monitor & Assign: Regularly check the SOAR platform (
soar-mcp_list_cases) for new or assigned alerts/cases.Initial Triage & Context: Assess alert severity, type, and gather initial case details (
soar-mcp_get_case_full_details). Decision Point: Is this potentially a duplicate?Refer to:
rules-bank/run_books/triage_alerts.mdRefer to:
rules-bank/run_books/common_steps/check_duplicate_cases.md
Basic Enrichment: Gather initial context on key Indicators of Compromise (IOCs) identified in the alert/case.
Refer to:
rules-bank/run_books/basic_ioc_enrichment.md
Assess & Investigate: Based on triage and enrichment, determine the nature of the alert. Decision Point: Is this a False Positive (FP), Benign True Positive (BTP), or does it require further investigation (True Positive/Suspicious)?
If FP/BTP: Proceed to Step 6 (Documentation & Closure).
If TP/Suspicious: Proceed to Step 5 (Specific Investigation).
Specific Investigation (Tier 1/2): Follow dedicated runbooks based on the alert type or findings. Examples:
Suspicious Login:
rules-bank/run_books/suspicious_login_triage.mdPhishing Report:
rules-bank/run_books/irps/phishing_response.md(Initial steps)Malware Alert:
rules-bank/run_books/malware_triage.mdIOC Investigation:
rules-bank/run_books/deep_dive_ioc_analysis.md(Tier 2+)Timeline Analysis:
rules-bank/run_books/case_event_timeline_and_process_analysis.md(Tier 2+)
Documentation: Document all findings, analysis steps, and conclusions clearly in the SOAR case (
soar-mcp_post_case_comment).Refer to guidelines:
rules-bank/run_books/guidelines/report_writing.md
Escalation or Closure: Decision Point: Based on the full investigation, should the case be escalated or closed?
Escalate: Assign the case to Tier 2/3 or a specialized team (e.g., IR, Forensics) with a summary of findings.
Close: If determined to be FP, BTP, or fully resolved at the current tier.
Refer to:
rules-bank/run_books/common_steps/close_soar_artifact.md
sequenceDiagram
participant Analyst
participant SOAR as secops-soar
participant SIEM as secops-mcp
participant GTI as gti-mcp
participant Runbooks as rules-bank/run_books/
Analyst->>SOAR: 1. Monitor Alert Queue (list_cases)
SOAR-->>Analyst: New/Assigned Alerts/Cases
Analyst->>Runbooks: 2. Consult triage_alerts.md / check_duplicate_cases.md
Analyst->>SOAR: Get Case/Alert Details (get_case_full_details, list_alerts_by_case)
SOAR-->>Analyst: Details (IOCs: I1, I2...)
Analyst->>Runbooks: 3. Consult basic_ioc_enrichment.md
loop For each Key IOC Ii
Analyst->>SIEM: lookup_entity(entity_value=Ii)
SIEM-->>Analyst: SIEM Context
Analyst->>GTI: get...report(ioc=Ii)
GTI-->>Analyst: GTI Context
end
Note over Analyst: 4. Assess: FP/BTP or Investigate Further?
alt FP/BTP
Analyst->>Runbooks: 6. Consult report_writing.md guidelines
Analyst->>SOAR: Document Findings (post_case_comment)
Analyst->>Runbooks: 7. Consult close_soar_artifact.md
Analyst->>SOAR: Close Case/Alert
else Investigate Further (TP/Suspicious)
Analyst->>Runbooks: 5. Consult specific runbook (e.g., malware_triage.md)
Note over Analyst: Follow specific runbook steps...
Analyst->>Runbooks: 6. Consult report_writing.md guidelines
Analyst->>SOAR: Document Findings (post_case_comment)
Note over Analyst: 7. Decision: Escalate or Close?
alt Escalate
Analyst->>SOAR: Assign Case to Tier 2/3
else Close (Resolved)
Analyst->>Runbooks: Consult close_soar_artifact.md
Analyst->>SOAR: Close Case/Alert
end
end
Common Scenario Entry Points#
Phishing Report: Start with
triage_alerts.md, then proceed torules-bank/run_books/irps/phishing_response.md.Malware Alert (Hash Provided): Start with
triage_alerts.md, then proceed torules-bank/run_books/malware_triage.md.Suspicious Login Alert: Start with
triage_alerts.md, then proceed torules-bank/run_books/suspicious_login_triage.md.General IOC Investigation: Start with
triage_alerts.md, thenbasic_ioc_enrichment.md, potentially followed bydeep_dive_ioc_analysis.md.
Completion Criteria#
The analyst has successfully navigated the standard workflow using this guide, consulted the appropriate detailed runbooks, and reached a documented decision point (closure or escalation) for the alert/case being handled.