Skip to content

SOC Automation Catalog

Document ID: OPS-SOP-012 Version: 1.0 Classification: Internal Last Updated: 2026-02-15

This catalog lists every automation the SOC uses or should implement, organized by category. Use it to track automation maturity, identify manual processes that should be automated, and onboard analysts to existing automations.


Automation Maturity Levels

graph LR
    L0[Level 0<br>Fully Manual] --> L1[Level 1<br>Assisted]
    L1 --> L2[Level 2<br>Semi-Auto]
    L2 --> L3[Level 3<br>Fully Auto]
    L3 --> L4[Level 4<br>Self-Tuning]

    style L0 fill:#dc2626,color:#fff
    style L1 fill:#f97316,color:#fff
    style L2 fill:#eab308,color:#000
    style L3 fill:#22c55e,color:#fff
    style L4 fill:#3b82f6,color:#fff
Level Name Description Example
L0 Fully Manual Analyst does everything by hand Copy-paste IOCs into lookup tools
L1 Assisted Tool provides suggestions, analyst acts SIEM enriches alert with context
L2 Semi-Automated Tool executes, analyst approves SOAR submits ticket after analyst confirms
L3 Fully Automated No human intervention needed Auto-block IOCs from TI feeds
L4 Self-Tuning System learns and adjusts automatically ML-based alert prioritization

1. Alert Triage & Enrichment

# Automation Description Trigger Current Target Priority
1.1 IOC Auto-Enrichment Lookup hash/IP/domain against TI feeds on alert creation New alert L1 L3 🔴 P1
1.2 Alert Deduplication Suppress duplicate alerts from same source within time window Alert ingestion L1 L3 🔴 P1
1.3 Alert Priority Scoring Calculate severity based on asset criticality + TI + user risk New alert L0 L2 🟠 P2
1.4 Context Enrichment Auto-add user info, asset details, recent activity to alert New alert L1 L3 🔴 P1
1.5 False Positive Filtering Auto-close known FP patterns with documentation Alert ingestion L0 L2 🟠 P2
1.6 Alert Correlation Group related alerts into incidents automatically Multiple alerts L1 L3 🟠 P2
1.7 GeoIP Enrichment Add geographic info to IP-based alerts IP in alert L2 L3 🟢 P3

2. Incident Response Automation

# Automation Description Trigger Current Target Priority
2.1 Phishing Email Quarantine Auto-quarantine reported phishing emails org-wide User report or detection L1 L3 🔴 P1
2.2 Endpoint Isolation Auto-isolate endpoint on confirmed malware/C2 P1/P2 malware alert L1 L2 🔴 P1
2.3 Account Disable Auto-disable compromised account Confirmed compromise (P1) L1 L2 🔴 P1
2.4 Firewall Block IOC Auto-add malicious IPs/domains to firewall block list Confirmed malicious IOC L1 L3 🟠 P2
2.5 Ticket Creation Auto-create incident ticket with enriched context New P1/P2 alert L2 L3 🟠 P2
2.6 Notification Dispatch Auto-send notifications based on severity and escalation matrix Incident classification L1 L3 🟠 P2
2.7 Evidence Collection Auto-collect forensic artifacts (memory, logs) on trigger P1 incident declared L0 L2 🟡 P3
2.8 MFA Reset Auto-trigger MFA re-enrollment after account compromise Account recovery L0 L2 🟡 P3

3. Threat Intelligence Automation

# Automation Description Trigger Current Target Priority
3.1 TI Feed Ingestion Auto-ingest IOCs from configured TI feeds Scheduled (hourly) L2 L3 🔴 P1
3.2 IOC Expiry Auto-expire old IOCs based on age and confidence Daily cleanup L0 L3 🟠 P2
3.3 Retroactive Hunting Re-scan historical logs when new high-confidence IOC arrives New critical IOC L0 L2 🟠 P2
3.4 TI Report Parsing Extract IOCs from PDF/email threat reports automatically Report received L0 L2 🟡 P3
3.5 MITRE Mapping Auto-tag alerts with ATT&CK techniques based on detection rule Alert creation L1 L3 🟠 P2

4. Detection Engineering Automation

# Automation Description Trigger Current Target Priority
4.1 Sigma Rule Deployment Auto-convert Sigma rules to SIEM query format and deploy Git push to rules repo L1 L3 🔴 P1
4.2 Detection Rule Testing Auto-validate new rules against test data before production PR to rules repo L0 L2 🟠 P2
4.3 Rule Performance Metrics Auto-track TP/FP ratio per rule, flag underperformers Weekly schedule L0 L2 🟠 P2
4.4 Coverage Gap Report Auto-generate MITRE ATT&CK coverage heatmap Monthly schedule L0 L2 🟡 P3
4.5 YARA Rule Scanning Auto-scan file submissions against YARA rule set File submission L1 L3 🟠 P2

5. Operational Automation

# Automation Description Trigger Current Target Priority
5.1 Shift Handoff Report Auto-generate shift summary from open tickets and alerts Shift end L0 L2 🟠 P2
5.2 Log Source Health Check Auto-alert when log source stops sending for > threshold Every 15 min L1 L3 🔴 P1
5.3 SIEM License Monitor Auto-alert when EPS approaches license limit Hourly check L0 L2 🟠 P2
5.4 SLA Breach Warning Auto-notify when ticket approaches SLA deadline Ticket age check L1 L3 🟠 P2
5.5 Monthly KPI Report Auto-generate SOC metrics dashboard for management Monthly schedule L0 L2 🟡 P3
5.6 Analyst Workload Balance Auto-distribute alerts based on analyst availability/skill Alert assignment L0 L2 🟡 P3
5.7 Compliance Evidence Export Auto-export evidence for audit (logs, tickets, metrics) Quarterly schedule L0 L2 🟡 P3

6. User & Entity Behavior

# Automation Description Trigger Current Target Priority
6.1 Impossible Travel Detection Auto-detect logins from geographically impossible locations Login event L2 L3 🟠 P2
6.2 Baseline Deviation Alert Alert when user behavior deviates significantly from baseline Continuous L0 L2 🟡 P3
6.3 Privileged Account Monitoring Auto-alert on unusual privileged account activity Privileged event L1 L3 🟠 P2
6.4 Off-Hours Activity Auto-flag activity outside normal working hours After-hours event L1 L2 🟡 P3

Implementation Roadmap

gantt
    title SOC Automation Roadmap
    dateFormat  YYYY-Q
    axisFormat  %Y-Q%q

    section P1 Critical
    IOC Auto-Enrichment          :2026-Q1, 90d
    Alert Deduplication          :2026-Q1, 90d
    Phishing Quarantine          :2026-Q1, 90d
    Sigma Rule Deployment        :2026-Q1, 90d
    Log Source Health Check      :2026-Q1, 90d

    section P2 High
    Alert Priority Scoring       :2026-Q2, 90d
    Endpoint Isolation           :2026-Q2, 90d
    TI Feed Ingestion            :2026-Q2, 90d
    Rule Performance Metrics     :2026-Q2, 90d

    section P3 Medium
    Evidence Collection          :2026-Q3, 90d
    Shift Handoff Report         :2026-Q3, 90d
    Monthly KPI Report           :2026-Q3, 90d

Automation Decision Framework

Use this framework to decide whether to automate a process.

Factor Score 1 (Low) Score 2 (Med) Score 3 (High)
Frequency Monthly or less Weekly Daily or more
Time per execution < 5 min 5–30 min > 30 min
Error risk (manual) Low Medium High
Impact if delayed Informational Operational Security-critical
Complexity to automate High (custom dev) Medium (API calls) Low (built-in feature)

Scoring: - 12–15: Automate immediately - 8–11: Plan for next quarter - 5–7: Keep manual, reassess later


Automation Metrics

Metric Target Measurement
Automation coverage (% of catalog at L2+) ≥ 50% Count items at L2+ / total
Mean Time to Enrich (MTTE) < 30 sec Alert creation → enrichment complete
Auto-resolved alerts ≥ 30% of P4 Auto-closed / total P4
SOAR playbook execution success rate ≥ 95% Successful runs / total runs
Analyst time saved per shift ≥ 2 hours Before vs after automation
False positive auto-filter accuracy ≥ 98% Correct FP / total auto-filtered

SOAR Playbook Quick Reference

These map to the SOAR Playbook Templates.

Playbook Trigger Key Actions Auto Level
PB-PHISH User report / email alert Quarantine → URL scan → notify user L2
PB-MALWARE EDR detection Isolate → collect evidence → ticket L2
PB-BRUTE 10+ failed logins Check geo → check MFA → block/alert L2
PB-IOC-BLOCK TI feed match Verify → add to blocklist → notify L3
PB-ACCT-COMP Confirmed compromise Disable → reset → MFA re-enroll → ticket L2
PB-LOG-HEALTH Source silent > 30 min Check → alert SOC → ticket to engineering L3