<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>SecOps Unpacked</title>
    <description>Welcome to SecOps Unpacked, a space dedicated to breaking down the realities of modern Security Operations. Here, I focus on practical insights across detection engineering, automation, incident response, and the shift toward AI-powered SOCs. You’ll find frameworks, playbooks, research, and tools that help security teams operate with purpose, whether you’re writing rules, scaling a detection program, or exploring how AI fits into your workflows. If your goal is to make your SOC faster, smarter, and built on what actually works, you’ll feel at home here. Trusted by practitioners, engineers, leaders, and founders who want clarity in SecOps. Join other security practitioners who are already learning, building, and automating with SecOps Unpacked.</description>
    
    <link>https://www.cybersec-automation.com/</link>
    <atom:link href="https://rss.beehiiv.com/feeds/OVdr38fePY.xml" rel="self"/>
    
    <lastBuildDate>Thu, 5 Mar 2026 15:41:14 +0000</lastBuildDate>
    <pubDate>Thu, 19 Feb 2026 15:19:02 +0000</pubDate>
    <atom:published>2026-02-19T15:19:02Z</atom:published>
    <atom:updated>2026-03-05T15:41:14Z</atom:updated>
    
      <category>Artificial Intelligence</category>
      <category>Cybersecurity</category>
      <category>Technology</category>
    <copyright>Copyright 2026, SecOps Unpacked</copyright>
    
    <image>
      <url>https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/5579bc25-809d-4fd6-aa79-33da3fd125c3/Secops_Unpacked_Logo.png</url>
      <title>SecOps Unpacked</title>
      <link>https://www.cybersec-automation.com/</link>
    </image>
    
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>beehiiv</generator>
    <language>en-us</language>
    <webMaster>support@beehiiv.com (Beehiiv Support)</webMaster>

      <item>
  <title>We built a framework to score AI SOC response capabilities</title>
  <description>Introducing AI Response Maturity Model [ARMM]</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/edf3f011-585a-4a7d-9cab-b326e032a6b3/ARMM_1.png" length="6173589" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/ai-response-maturity-model</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/ai-response-maturity-model</guid>
  <pubDate>Thu, 19 Feb 2026 15:19:02 +0000</pubDate>
  <atom:published>2026-02-19T15:19:02Z</atom:published>
    <dc:creator>Andrei Cotaie</dc:creator>
    <dc:creator>Cristian Miron</dc:creator>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Framework]]></category>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2DFF; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#0099FFFF; }
  .bh__table_header p { color: #FFFFFFFF; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h1 class="heading" style="text-align:left;"><br><br></h1><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>1. Introduction</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The AI SOC market is growing fast and there are products on it that are doing serious work. Some of them have strong integration capabilities, solid reasoning engines, and response actions that actually execute in production. The market has come a long way in four years.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">But there is a problem with how we evaluate these products.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">When every vendor says &quot;AI-powered response,&quot; that phrase covers everything from a fully autonomous isolation workflow to a chatbot that suggests you maybe think about resetting a password. Both get the same label in the marketing material. Both show up in the same analyst reports. And when a security team sits down to compare three products, they have no standardized way to measure the gap between &quot;our AI handles response&quot; and what that actually means in operational terms.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Some products are close to real autonomy in specific domains. Some are strong in analysis but thin on execution. Some have broad coverage but almost nothing runs without human approval. These are all valid positions on a maturity spectrum. The problem is that there is no shared framework to place them on that spectrum consistently.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">So we built one.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">We call it ARMM. And yes, the name is intentional.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">A decade ago, the SOAR generation solved half the problem. We built the arms. Playbooks, integrations, automated response workflows. The execution layer was there. What was missing was the brain. Every decision tree was hand-coded. Every branching logic was written by an engineer who had to anticipate every possible scenario. The arms moved, but only along rails that humans laid down manually. When the scenario deviated from the playbook, the arm froze.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Now the AI SOC generation has solved the other half. We built the brain. LLMs reason across alerts, correlate context, analyze logs, and make judgment calls that no static playbook could replicate. But somewhere along the way, a lot of products forgot to attach the arms. The reasoning is strong. The analysis is sharp. And then it hands you a summary and says &quot;here is what you should probably do.&quot; The brain thinks. The arm does not move.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">ARMM evaluates both. The reasoning quality, the decision-making maturity, the trust you can place in the AI&#39;s judgment. And the response capability, the execution depth, the ability to actually take action without three humans supervising. It weighs the arm heavier because that is where the industry gap is widest right now. But it does not ignore the brain, because an arm without a brain is just a SOAR playbook and we already know how that story ended.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">ARMM is a structured scoring system for evaluating what an AI SOC solution can actually do in the response layer. It covers 80+ response capabilities across six domains: Identity, Network, Endpoint, Cloud, SaaS, and General Options. And it provides a common language so that when someone says &quot;we handle response,&quot; there is a way to ask: at what level, across how many actions, and with what degree of autonomy?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The CyberSec Automation Blog has published over a dozen articles and podcast episodes covering what makes a good automation program succeed, how to evaluate tools, and how to structure decision-making around security automation purchases. We have built tool comparison lists, evaluation checklists, and decision frameworks. ARMM is the next step in that work.</span></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>2. Why Another Framework</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Most existing evaluation methods for AI SOC solutions are either vendor-produced (and therefore biased toward their own capabilities) or too generic to capture the specific nuances of AI-driven response. Analyst reports compare products at a feature-list level without measuring automation depth. Vendor demos show best-case scenarios without exposing the operational friction underneath.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Our focus is narrow and deliberate: response capabilities. Most AI SOC solutions already deliver strong reporting and analysis features. They can summarize alerts, correlate indicators, and reduce false negatives in a mature environment (we emphasize mature because these solutions need access to quality logs and, in more advanced implementations, to organizational documentation and environment-specific context). Where the industry needs structured evaluation is in the response layer: the actions an AI SOC solution can take, how autonomously it can take them, and under what conditions.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">We acknowledge that some of the capabilities listed in this framework may seem aspirational at this stage. That is by design. The framework is intended to serve both as a current-state evaluation tool and as a forward-looking roadmap.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">We are not scoring specific vendors. The goal is to establish a shared methodology that allows security teams to answer questions such as:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Which solution provides more relevant response capabilities for my environment?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Which solution operates at a higher level of autonomy for the actions that matter to my program?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Which solution can help me reduce my alert backlog without requiring additional headcount?</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">For product managers working on AI SOC products, the framework serves as a competitive analysis baseline:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Where is my competition positioned, and what capabilities are driving their wins?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">What high-value capabilities are underserved across the market?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Am I investing engineering resources in features that security practitioners actually prioritize?</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Because this is a fast-moving space, we are starting at version 0.1. This is a living document. Version 1.0 will be designated when the framework reaches a level of stability and community validation that warrants it.</span></p><p class="paragraph" style="text-align:left;"></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>3. Scoring Methodology</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">ARMM supports two distinct approaches to scoring, each designed for a different operational question.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>Evaluator Mode </b></span><span style="color:rgb(51, 51, 51);">is the straightforward path. You score each capability on the 0-1-2 scale described above (with the 1C, 1G, 1A sub-levels) and the framework calculates your coverage rate, automation depth, and per-plane breakdown. The tier placements come from ARMM&#39;s reference tables. You do not need to factor in your organizational context. This mode answers one question: given two or more AI SOC products, which one covers more of what I need and at what automation level? It is built for procurement teams, SOC managers running vendor evaluations, and anyone who needs a side-by-side comparison without spending weeks on it.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>Builder Mode </b></span><span style="color:rgb(51, 51, 51);">adds a second scoring layer on top. Instead of relying on fixed reference tiers, you score each action across three axes: Trust (how much confidence does your implementation warrant), Complexity (how hard is it for your specific team to build and maintain), and Impact (what is the blast radius if something goes wrong). The action score becomes T + C + I, and the tier placement shifts based on your organizational reality. The same action that scores Entry for a mature team with established automation pipelines might score Explorer for a team that is deploying its first AI SOC integration. This mode answers a different question: given my team, my environment, and my risk tolerance, where should I invest engineering effort to move up the maturity ladder? It is built for product managers, engineering leads, and internal SOC teams running their own automation programs.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Both modes evaluate the same six planes and the same 80+ response capabilities. Both produce per-plane breakdowns and a composite maturity label. The difference is whether you want a product-level comparison (Evaluator) or an environment-aware implementation roadmap (Builder). The public ARMM app at </span><a class="link" href="https://armm.secops-unpacked.ai?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=we-built-a-framework-to-score-ai-soc-response-capabilities" target="_blank" rel="noopener noreferrer nofollow">armm.secops-unpacked.ai</a> <span style="color:rgb(51, 51, 51);"> supports both.</span></p><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a9e3d684-d3ab-48cb-8bd8-a0b6c53c3ce3/Evaluator.png?t=1771421146"/></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>3.1 The Capability Scoring System (0-1-2)</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Each response capability in the framework is scored on a three-level scale that measures the degree of automation available:</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>0 (Not Available): </b></span><span style="color:rgb(51, 51, 51);">The feature does not exist in the product. There is no mechanism, manual or automated, to perform this action through the AI SOC solution.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>1 (Available with Human Involvement): </b></span><span style="color:rgb(51, 51, 51);">The feature exists but requires some form of human interaction before execution. Because human involvement can range from full collaboration to a simple approval click, this level is subdivided into three sub-categories:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">1C (Collaborator): The solution requires continuous back-and-forth interaction with an analyst to reach a response action. The AI acts as a partner, not an autonomous agent.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">1G (Guide): The solution generates a plan and presents options for a specific action, but it is not confident in recommending a single path. It lays out alternatives and lets the analyst choose.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">1A (Approver): The action is essentially ready to execute. The AI has determined the correct response and prepared the action, but requires a human to click approve before it fires. This is the closest step to full automation while still keeping a human in the loop.</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>2 (Fully Automated): </b></span><span style="color:rgb(51, 51, 51);">The action is performed without any human involvement. The vendor (or internal implementation) has demonstrated that the AI SOC solution can execute this action with sufficient confidence that no human review is required. At the time of writing, level 2 is exceptionally rare for most response categories. The framework includes it to establish the target state and to differentiate products that are moving in that direction from those that are not.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/edf3f011-585a-4a7d-9cab-b326e032a6b3/ARMM_1.png?t=1771411175"/></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>3.2 The Three Scoring Axes (Builder Mode)</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">In Builder Mode, each response action is evaluated across three dimensions:</span></p><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Axis 1: Decision Fidelity and Programmatic Trust (T)</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This axis measures the confidence level warranted by the AI SOC implementation. It correlates directly with implementation quality: reasoning log depth, context-aware decision-making, and guardrails against hallucination.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">T = 1 (Enrichment): AI output assists human-led investigations. The AI provides context and data but does not recommend or execute actions.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">T = 2 (Validated): AI recommends a specific action. A human confirms before execution occurs.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">T = 3 (Autonomous): AI executes without human intervention. This requires the highest level of implementation maturity and organizational trust.</span></p></li></ul><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Axis 2: Implementation and Maintenance Complexity (C)</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This axis evaluates the technical friction in building and sustaining the automation, relative to the skills and resources of the team responsible for it. This is deliberately team-dependent. An automation rated C = 3 for a junior team may be C = 2 for a team of specialized AI engineers with established CI/CD pipelines for their playbooks.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">C = 1 (Low): Simple API calls or native integrations with minimal configuration.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">C = 2 (Medium): Multi-step orchestration across multiple systems requiring coordination and testing.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">C = 3 (High): Complex behavioral baselining, legacy system integration, or custom model tuning.</span></p></li></ul><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Axis 3: Operational Impact and Blast Radius (I)</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This axis captures the business risk associated with the action. It is typically the most stable axis across organizations, but shifts based on asset criticality. Isolating a standard employee laptop has a different blast radius than isolating a production database server.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">I = 1 (Low): Negligible disruption. Background scans, tagging, enrichment activities.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">I = 2 (Medium): Temporary disruption. Resetting a standard user session, blocking a non-critical port.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">I = 3 (High): Significant downtime, data loss risk, or reputational damage. Production system changes, VIP account modifications, critical infrastructure alterations.</span></p></li></ul><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a84ed1fd-a11a-4fe3-bd27-cebe04c9a6c3/Builder.png?t=1771421325"/></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>3.3 The Maturity Computation Logic</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The scoring system builds from individual actions up to a full program assessment through five layers. Each layer uses a defined formula.</span></p><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Layer 1: Action-Level Score (S)</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">For a single response action, the score is the sum of its three axis values:</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e247f14c-cd3d-403f-9c5c-640c462d2c83/formula_3.png?t=1771421218"/></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The minimum possible score is 3 (T=1, C=1, I=1). The maximum is 9 (T=3, C=3, I=3).</span></p><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Layer 2: Tier Mapping</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The action score maps to one of four maturity tiers:</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score Range</b></span></p></th><th class="bh__table_header" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th><th class="bh__table_header" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">3.00 to 5.99</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">Explorer</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Foundational; low-risk quick wins with minimal blast radius</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">6.00 to 6.99</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">Entry</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Stabilized; moderate effort and impact, suitable for early-stage programs</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">7.00 to 7.99</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">Advanced</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Mature; requires high-fidelity reasoning and established trust</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">8.00 to 9.00</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">Expert</span></p></td><td class="bh__table_cell" width="33%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Critical; high blast radius, autonomous VIP handling, or production-critical actions</b></span></p></td></tr></table></div><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Layer 3: Domain Maturity Score (D)</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The maturity score for a specific domain (e.g., Endpoint, Identity) is the arithmetic mean of all action scores within that domain:</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7e7a5681-1613-4c04-8780-faabb2bc3dd7/Formula_1.png?t=1771411343"/></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Where n is the number of scored actions in the domain. The resulting D value maps to a tier using the same thresholds from Layer 2.</span></p><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Layer 4: Program Maturity Score (P)</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The overall program score is the arithmetic mean of all domain scores, with equal weighting across all six planes:</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5b53d795-c89b-4a04-bae4-f6a93057456c/Formula_2.png?t=1771411446"/></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Equal plane weighting is a deliberate design choice. It prevents planes with more actions (Endpoint has 22, SaaS has 10) from dominating the evaluation. Each plane contributes exactly one-sixth of the overall score.</span></p><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Layer 5: Composite Maturity Label</b></span></h3><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The composite label is not derived from the program score directly. It uses sequential gating logic:</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The composite label equals the highest tier where at least four out of six planes independently meet that tier&#39;s threshold, and the qualification chain is unbroken from Explorer upward. A product cannot be labeled Advanced if it has gaps at the Explorer tier.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The four-out-of-six rule is intentionally forgiving. A product focused on cloud-native environments may legitimately deprioritize network-level response. That should not disqualify it from a meaningful composite label. But it still needs breadth across most planes to earn a higher tier.</span></p><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>3.4 Context-Aware Scoring: Why Environment Matters</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The ARMM recognizes that the maturity level of an automated action is not a static property of the feature itself. It is an emergent property of the environment where it is applied. The three axes (T, C, I) are all subject to organizational variance, which means the same product capability produces different scores in different contexts.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>Example: &quot;Isolate Device&quot; evaluated by three different organizations using the same AI SOC product:</b></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Context</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Trust (T)</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Complexity (C)</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Impact (I)</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Org A: Mature Program / Expert Team</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Org B: New Program / Junior Team</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Org C: High-Risk Assets / Manual-First</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The product capability is identical across all three. The scores differ because the Trust axis reflects implementation maturity, the Complexity axis reflects team capability, and the Impact axis (while stable here) can shift based on asset criticality. A vendor benchmark alone is insufficient. Builder Mode exists specifically to capture this variance.</span></p><p class="paragraph" style="text-align:left;"></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>4. Response Capability Domains</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The framework organizes response capabilities into six domains. The first five (Identity, Network, Endpoint, Cloud, SaaS) cover specific technical response planes. The sixth (General Options / Usability) covers platform-level characteristics that affect the operational quality of the solution independent of any specific response action.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">For the first five domains, each capability is scored using the 0-1-2 system described in Section 3.1 (Evaluator Mode) or the T+C+I system described in Section 3.3 (Builder Mode). For the General Options domain, the scoring criteria shift slightly: 0 means the feature is not available, 1 means the feature is available but limited in capability or partially implemented, and 2 means the feature is fully available, functional, and tested.</span></p><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>4.1 Identity Response Plane</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Identity-related response actions target user accounts, service principals, groups, and access permissions. These actions are among the most commonly needed in incident response and are often the first automation candidates for SOC teams.</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reset Password</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reset a standard user&#39;s password</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Revoke Sessions</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Terminate all active sessions for a user account</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable User</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable a standard user account</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable Service Principals</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable a service account, service principal, or managed identity</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Permissions</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a specific set of permissions from an account</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Group Adherence</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Add or remove an account from a security group</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Group Creation</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a new security group</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Token Rotation</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create or rotate secrets and tokens</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Sharing Permissions</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove sharing permissions on resources</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Label User (Tagging)</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Apply a tag or label to a user account for tracking</span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(102, 102, 102);"><i>Builder Mode Reference Scoring (Mature AI SOC Program, Skilled Engineering Team):</i></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>T</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>C</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>I</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Group Adherence</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Label User (Tagging)</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Revoke Sessions</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reset Password (Std)</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable Standard User</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Sharing Permissions</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Specific Permissions</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Group Creation</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable Service Principals</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reset VIP Password</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Rotate Secrets (Prod)</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>4.2 Network Response Plane</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Network-level response actions modify traffic flow, access control, and device connectivity. These are often high-impact actions with significant blast radius, making the Trust and Impact axes particularly important in scoring.</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">ACL Creation</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a new access control list on the network</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">VLAN Creation</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a new VLAN on the network</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Firewall Rule Creation</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a new firewall rule</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">IPS Rule Creation</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a new IPS rule in deny mode</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Network Connection Reset</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reset a network connection</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">DNS Entry Change</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify an entry in the DNS records</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Routing Table Change</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify a routing entry</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Sinkhole Traffic</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Redirect traffic to a sinkhole</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Rate Limit Traffic</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Limit traffic by a particular indicator</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">VLAN Modification</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Move a device to a restricted VLAN</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine Device</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine a device at the network level</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine Server</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine a server running an enterprise-level service</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify NAT Rules</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Change NAT rules to modify traffic patterns</span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(102, 102, 102);"><i>Builder Mode Reference Scoring:</i></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>T</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>C</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>I</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Network Connection Reset</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Sinkhole Traffic</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Rate Limit Traffic</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">ACL Creation</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Firewall Rule Creation</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">DNS Entry Change</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify NAT Rules</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">IPS Rule Creation</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">VLAN Creation</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">VLAN Modification</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Routing Table Change</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">9</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine Server</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr></table></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>4.3 Endpoint Response Plane</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Endpoint response actions operate directly on devices and their software environment. This domain has the largest number of capabilities because endpoint response spans file operations, process management, application control, forensics, and OS-level changes.</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Isolate Device</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Isolate a device from all network connectivity</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Initiate Malware Scan</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Start a scan on the device</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Grab File from Device</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Upload a file to a designated container</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Submit File to Sandbox</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Submit a file for sandbox analysis</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Lock Out User</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Lock a user out of the device</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove User from Device</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a user account from the device</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Files</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete specific files from the device</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Kill Processes</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Terminate a running process</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Application</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Uninstall an application</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Browser Extension</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a browser extension</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Browser Settings</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Set, modify, or replace browser security parameters</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Scheduled Task</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a cron entry or scheduled task</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Startup Items</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a process, agent, or file from system startup</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Library / Package</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a library from a development environment</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Upgrade Application</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Force an automatic update on installed software</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Upgrade OS</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Force an automatic OS update</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Deploy Script</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Deploy a script or application needed for remediation</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Registry Key</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Change a value or create a new registry key</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable Service</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Change the status of or remove a service</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Collect Memory Dump</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Initiate and retrieve a memory dump forensically</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Clear Browser Cache</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove all files, cookies, and data from the browser cache</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Device from Domain</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a device from the domain</span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(102, 102, 102);"><i>Builder Mode Reference Scoring:</i></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>T</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>C</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>I</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Initiate Malware Scan</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Clear Browser Cache</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Grab File from Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Collect Memory Dump</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Submit File to Sandbox</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Kill Processes</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Block File (via Hash)</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Lock Out User</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Browser Extension</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Scheduled Task</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Startup Items</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable Service</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Files</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Browser Settings</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Application</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove User from Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Library / Package</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Registry Key</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Isolate Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Device from Domain</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Upgrade Application</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Upgrade OS</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Deploy Script</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">9</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr></table></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>4.4 Cloud Response Plane</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Cloud response actions target infrastructure resources, access controls, and storage in cloud environments. The blast radius of cloud actions can be particularly severe because a single misconfigured change can affect multiple dependent services.</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Security Group Rules</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify firewall rules on a cloud resource to restrict access</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create Security Group</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a new security group and apply it to restrict traffic</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Isolate Resource</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine a cloud resource so it is unreachable</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Access Type</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Switch a resource from public to private or restrict anonymous access</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Permissions to Resource</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove a service principal or managed identity from accessing a resource</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Resource</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete a resource from the cloud environment</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Stop Resource</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Stop a resource from execution</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify KeyVault Entries</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Add or modify resources in a KeyVault</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Use Breakglass Account</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Use a breakglass account in case of emergency</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Files from Storage</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove files from a storage bucket or storage account</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Copy Storage Device</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a copy of a cloud storage resource for forensic investigation</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Mount Storage Device</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Mount a new storage capability to a VM for forensic investigation</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Snapshot VM</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create a snapshot of the current state of a virtual machine</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Enable Diagnostic Settings</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Alter settings that enable advanced log gathering</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Apply Resource Lock</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Make the resource immutable or read-only</span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(102, 102, 102);"><i>Builder Mode Reference Scoring:</i></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>T</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>C</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>I</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Enable Diagnostic Settings</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Apply Resource Lock</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Snapshot VM</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Stop Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Security Group Rules</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create Security Group</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Permissions to Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Copy Storage Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Mount Storage Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Access Type</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Isolate Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Files from Storage</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify KeyVault Entries</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Use Breakglass Account</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr></table></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>4.5 SaaS Response Plane</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">SaaS response actions focus primarily on email and productivity platforms, which are among the most common attack surfaces in enterprise environments. Actions in this domain directly affect end-user workflows and communications.</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Email</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove an email from a user&#39;s mailbox</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Quarantine Email</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Move an email to the user&#39;s quarantine or junk box</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create Routing Rules</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create rules to handle and route incoming email</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Grab Email Sample</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Extract an attached file from an email</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Grab Email Link</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Extract a link from inside an email message</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Add / Remove Meeting Invite</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify a user&#39;s calendar</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Read / Modify User Status</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Read or change a user&#39;s status in the HR platform</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable Malicious Inbox Rule</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Disable a rule created by a malicious actor from a user&#39;s mailbox</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Block Sender</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Block a sender from the domain</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify HR Records</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify HR records in the system beyond status</span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(102, 102, 102);"><i>Builder Mode Reference Scoring:</i></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>T</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>C</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>I</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Enable Diagnostic Settings</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Apply Resource Lock</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Snapshot VM</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">5</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Stop Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Security Group Rules</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Create Security Group</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Permissions to Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Copy Storage Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Mount Storage Device</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify Access Type</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Isolate Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Remove Files from Storage</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Modify KeyVault Entries</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Use Breakglass Account</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Delete Resource</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8</span></p></td><td class="bh__table_cell" width="16%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Expert</b></span></p></td></tr></table></div><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>4.6 General Options / Usability</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This domain evaluates platform-level capabilities that are not tied to any specific response action but directly affect how useful, trustworthy, and manageable the AI SOC solution is in production. The scoring for this domain uses a modified scale: 0 means not available, 1 means available but limited, and 2 means fully available and functional.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This domain is split into two sub-categories to distinguish between operational platform features and AI-specific evaluation criteria.</span></p><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>Platform Operations</b></span></h3><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Close Alerts in SIEM</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The tool can close alerts in all major SIEM solutions</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Logging</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Platform logging allows identification of all actions taken</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reasoning Logging</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Reasoning steps taken by the platform are logged at sufficient detail</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">API Development</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The API is robust enough for integration with other security tools</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Support Level</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Support is responsive and allows for adequate issue resolution</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Account Management</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Account management is straightforward with SSO integration</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Roles and Responsibility</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Role-based access control is available with sufficient granularity</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Ease of Use (GUI)</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The GUI is navigable and intuitive</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Native Chat Integration</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Native integration with major communication platforms</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Alerting</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Automatic alerting when platform-level or analysis-level issues arise</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Stats / Health Dashboards</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Dashboards showing current platform status and performance</span></p></td></tr></table></div><h3 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>AI-Specific Evaluation Criteria</b></span></h3><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Action</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Description</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Bring Your Own Model</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Ability to integrate custom models into the platform</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Context Grounding</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Ability to bring organizational data to feed into the ML model</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Autonomous Action Thresholds</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Platform allows setting confidence thresholds for autonomous execution</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Investigation Audit Trail</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Complete, exportable record of every action (AI and human) with timestamps</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">IR Metrics Tracking</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Native tracking of MTTD, MTTA, MTTT, MTTI, MTTR without external tooling</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Feedback Loop Mechanism</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Analysts can confirm, reject, or correct AI decisions with feedback incorporated</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Auto-Close Reversal Tracking</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Tracks the rate at which auto-closed alerts are reopened by analysts</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Explainability / Decision Transparency</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">AI provides clear, traceable reasoning for every decision</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">AI Decision Accuracy Reporting</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Tracks TP accuracy, FP accuracy, and confidence scores over time</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Model Drift Detection</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Monitors AI model performance and alerts when accuracy degrades</span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Adversarial Robustness Testing</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Supports or integrates with red team exercises to test AI resilience</span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>5. Aggregate Maturity Scoring</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Evaluating each plane individually is necessary but not sufficient. Security teams making purchasing decisions and product managers tracking competitive positioning need a consolidated view that communicates the overall picture without hiding the details.</span></p><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>5.1 Automation Depth Score</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This is the most operationally significant metric and the one that separates real autonomous solutions from products that wrapped a chatbot interface around a set of API calls.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Across all covered capabilities, calculate the distribution:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">What percentage is fully automated (level 2)?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">What percentage sits at Approver level (1A)?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">What percentage sits at Guide level (1G)?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">What percentage sits at Collaborator level (1C)?</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">What percentage is not available at all (0)?</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">A product could have 80% of capabilities covered but only 5% fully automated. That is a fundamentally different product than one with 60% covered but 40% fully automated. The first is broad but shallow. The second is narrower but operates with real autonomy where it counts.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>Full Automation Rate: </b></span><span style="color:rgb(51, 51, 51);">The percentage of total capabilities at level 2. This is the true measure of how much an AI SOC solution can operate without human intervention.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>Coverage Rate: </b></span><span style="color:rgb(51, 51, 51);">The percentage of total capabilities at any level above 0. This measures breadth regardless of automation depth.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The relationship between these two numbers tells you everything about how the product actually operates. A high coverage rate with a low automation rate means the product is a guided workflow tool with AI branding. A moderate coverage rate with a high automation rate relative to coverage means the product is autonomous in its areas of focus but limited in scope.</span></p><h2 class="heading" style="text-align:left;"><span style="color:rgb(46, 117, 182);"><b>5.2 Combined Scoring Readout</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">A complete ARMM evaluation for a product produces the following consolidated output:</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Metric</b></span></p></th><th class="bh__table_header" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Value</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Overall Score</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>47% (equal plane weighted)</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Composite Maturity</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry (5 of 6 planes at Entry or above)</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Automation Depth</span></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>12% fully automated, 61% covered at any level</b></span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);"><b>Per-Plane Breakdown:</b></span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><th class="bh__table_header" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Plane</b></span></p></th><th class="bh__table_header" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Score</b></span></p></th><th class="bh__table_header" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Coverage</b></span></p></th><th class="bh__table_header" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Fully Automated</b></span></p></th><th class="bh__table_header" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(255, 255, 255);"><b>Tier</b></span></p></th></tr><tr class="bh__table_row"><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Identity</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">78%</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7/9 covered</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">2 actions</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Network</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">42%</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">8/13 covered</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1 action</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Endpoint</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">38%</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">12/21 covered</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">1 action</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Cloud</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">31%</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">6/15 covered</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">0 actions</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Explorer</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">SaaS</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">55%</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">7/10 covered</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3 actions</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Entry</b></span></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">General Options</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">64%</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">10/14 covered</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);">3 actions</span></p></td><td class="bh__table_cell" width="20%"><p class="paragraph" style="text-align:center;"><span style="color:rgb(51, 51, 51);"><b>Advanced</b></span></p></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>6. Reading the Model</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">A product can reach Expert level on a specific plane by checking all the boxes for that domain. But it would be difficult to consider an AI SOC Response solution as Expert level overall if it lacks the ability to perform foundational actions like closing alerts in a SIEM. The tier system is designed to reward both depth within a domain and breadth across domains.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The reference maturity tables provided in Section 4 use example scores from a hypothetical mature AI SOC program with a skilled engineering team. These are illustrative, not universal benchmarks. The environmental dynamics described in Section 3.5 are not optional context; they are a core part of how the framework is intended to be used.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">When comparing two products, the most informative comparison is not the aggregate score. It is the per-plane breakdown combined with the Automation Depth Score. Two products at the same composite tier can have radically different operational profiles. One may cover 80% of capabilities at the Collaborator level. The other may cover 50% but with 30% at full automation. These are different products for different buyers with different operational maturity levels.</span></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>7. Limitations and Future Work</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">This is version 0.1. The framework has known limitations:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The capability lists are not exhaustive. New response actions will emerge as AI SOC products mature and as attack surfaces expand.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The three-axis scoring (T, C, I) requires subjective judgment that will vary between evaluators. We plan to develop calibration guidelines to reduce inter-evaluator variance.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The framework does not currently weight domains differently. In practice, Identity response may be more important than Network response for a given organization. Weighted scoring is planned for a future version.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">Detection and analysis capabilities are out of scope for this version. A separate framework or an extension to ARMM may address those in the future.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">We have not included pricing, deployment time, or vendor lock-in considerations. These are important purchase factors but are outside the scope of a technical maturity model.</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">We are building a public web application where users can input their product&#39;s capabilities and generate ARMM scoring layers automatically, along with an exportable CSV. The application is available at: </span><a class="link" href="https://armm.secops-unpacked.ai/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=we-built-a-framework-to-score-ai-soc-response-capabilities" target="_blank" rel="noopener noreferrer nofollow">armm.secops-unpacked.ai</a></p><h1 class="heading" style="text-align:left;"><span style="color:rgb(27, 58, 92);"><b>8. Conclusion</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The AI SOC market is growing faster than the industry&#39;s ability to evaluate products on consistent terms. The ARMM framework provides a structured, repeatable methodology for measuring what an AI SOC solution can actually do in the response layer, how autonomously it can do it, and what it takes to deploy and maintain that capability in a specific operational environment.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">The framework is built for two audiences: security teams evaluating products and product managers building them. For security teams, it provides a checklist and scoring system that cuts through marketing language and focuses on operational capability. For product teams, it provides a competitive analysis baseline and a prioritization framework for feature development.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">SOAR gave us arms without brains. The first wave of AI SOC products gave us brains without arms. The products that will win this market are the ones that connect both. ARMM gives you a way to measure how far along that connection is, and where the gaps remain.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(51, 51, 51);">No current AI SOC solution will check every box. That is not the point. The point is to establish a common language and a common measurement system so that the conversation about AI SOC response capability is grounded in specifics rather than promises. Version 0.1 is the starting point. The framework will evolve as the market does.</span></p></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=20e8e6d6-1623-41f8-8710-b15024952b39&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>The Fear of Not Doing Enough</title>
  <description>Why Security Teams Keep Generating Work They Can&#39;t Handle</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6879bc51-230d-406e-a7e2-5af5065d8d49/How_Security_Work_is_generated_.gif" length="155599" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/the-fear-of-not-doing-enough</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/the-fear-of-not-doing-enough</guid>
  <pubDate>Fri, 13 Feb 2026 15:46:33 +0000</pubDate>
  <atom:published>2026-02-13T15:46:33Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><h1 class="heading" style="text-align:left;" id="the-fear-of-not-doing-enough-securi">The Fear of Not Doing Enough: Security&#39;s Workflow Problem</h1><p class="paragraph" style="text-align:left;">If you&#39;ve been following this blog, you know I&#39;ve spent a lot of time on AI transforming investigation, triage, and detection engineering. And a few months back I wrote about the single pane of glass, how it&#39;s not a product you buy but a system you build, piece by piece, like Legos.</p><p class="paragraph" style="text-align:left;">That post was about the architecture. What tools do you need, how do they connect, where does data flow.</p><p class="paragraph" style="text-align:left;">This post is about the layer underneath that nobody talks about. Not the tools. The work itself. Where it comes from, how it flows, and why we have zero visibility into most of it.</p><h2 class="heading" style="text-align:left;" id="the-fear-of-not-doing-enough">The Fear of Not Doing Enough</h2><p class="paragraph" style="text-align:left;">Security has this pattern I keep seeing everywhere.</p><p class="paragraph" style="text-align:left;">New attack technique drops. A CVE trends on Twitter. Some threat intel report lands in your inbox with a fancy APT name. What happens next? Predictable.</p><p class="paragraph" style="text-align:left;">Someone writes a generic detection rule fast so the team has &quot;something.&quot; Gets pushed to production. Generates noise. Nobody tunes it because there&#39;s already another thing screaming for attention.</p><p class="paragraph" style="text-align:left;">The false sense of coverage becomes more important than actual coverage.</p><p class="paragraph" style="text-align:left;">I call this the <b>Fear of Not Doing Enough.</b> And honestly? It drives most of the operational pain in security teams today.</p><p class="paragraph" style="text-align:left;">You write a detection rule. Do you have the SOP for when it fires? Do you know the full analysis path an analyst should follow? Can you estimate how that alert impacts your team&#39;s workload downstream? Do you know what &quot;done&quot; looks like for that alert type?</p><p class="paragraph" style="text-align:left;">If you can&#39;t answer those, you didn&#39;t deploy a detection. You deployed a work generator with no operating manual. Multiply that across dozens of detections written under pressure and you get patchwork coverage that looks great on a dashboard but falls apart when someone has to actually operate it.</p><p class="paragraph" style="text-align:left;">But here&#39;s the thing. Even if you fix all of that, you&#39;re still only looking at one input stream.</p><h2 class="heading" style="text-align:left;" id="its-not-just-siem-alerts">It&#39;s Not Just SIEM Alerts</h2><p class="paragraph" style="text-align:left;">A <a class="link" href="https://dl.acm.org/doi/10.1145/3723158?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-fear-of-not-doing-enough" target="_blank" rel="noopener noreferrer nofollow">ACM Computing Surveys paper</a> (Tariq et al., 2025) reviewed over 30 solutions to alert fatigue in SOCs. Thorough paper, I&#39;ll give them that. Identifies four root causes: staff shortage, high false positive rates, disconnected dashboards, and inefficient SOPs.</p><p class="paragraph" style="text-align:left;">But every single solution assumes the work starts with a SIEM alert.</p><p class="paragraph" style="text-align:left;">Now look, I&#39;m not saying SIEM alerts are a small part of the work. For most teams they&#39;re probably more than half. But here&#39;s what matters: the work that doesn&#39;t come from the SIEM is often the most manual, least structured, and hardest to track.</p><p class="paragraph" style="text-align:left;">IT escalations. Someone from the help desk pings you on Slack: &quot;Hey, this looks weird.&quot; Access review requests from HR. Audit findings that need remediation tracking. Pen test findings that need to be assigned and fixed. Third-party risk questionnaires. Compliance asks from legal.</p><p class="paragraph" style="text-align:left;">All real security work. And here&#39;s the thing about it: only some or none of it has a playbook or automation behind it. Most of it lives in Slack threads, email chains, and spreadsheets. It&#39;s the security work that runs entirely on copy-paste, tribal knowledge, and good intentions.</p><p class="paragraph" style="text-align:left;">Your SIEM alerts, for all their problems, at least flow through a pipeline. They get enriched. They have some structure. Maybe even a SOAR playbook attached. The non-SIEM work? It&#39;s the Wild West.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/erikbloch/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-fear-of-not-doing-enough" target="_blank" rel="noopener noreferrer nofollow">Erik Bloch</a> has been making this point for years.A lot of the work SOC is doing day-to-day has nothing to do with chasing advanced adversaries. It&#39;s tickets, reports, evidence collection, reconciling data across tools. The mundane operational grind that actually burns people out.</p><p class="paragraph" style="text-align:left;">And here&#39;s the part that really gets me. Outside of very large enterprises that have 10 security sub-departments with dedicated teams for everything, the same 3-5 people triaging SIEM alerts are also pulling evidence for the auditor, handling the IT escalation, and answering the compliance questionnaire. There&#39;s no luxury of specialization. The alert queue is just one input stream among many. And the non-SIEM stuff eats time disproportionately because it&#39;s all manual.</p><h2 class="heading" style="text-align:left;" id="security-work-has-no-gravity">Security Work Has No Gravity</h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.linkedin.com/in/rosshaleliuk/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-fear-of-not-doing-enough" target="_blank" rel="noopener noreferrer nofollow">Ross Haleliuk</a> recently wrote a great piece about S<a class="link" href="https://ventureinsecurity.net/p/servicenow-is-betting-on-workflow?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-fear-of-not-doing-enough" target="_blank" rel="noopener noreferrer nofollow">erviceNow betting on &quot;workflow gravity&quot;</a> to compete with the security platform giants. The thesis is simple. Whoever owns where work happens owns the decisions.</p><p class="paragraph" style="text-align:left;">Data gravity pulls information into a single system of record. Your SIEM, your data lake, whatever. That part most teams have figured out. Workflow gravity is different. It pulls action into a single system of action. One place where work lands, gets triaged, gets tracked, and gets done.</p><p class="paragraph" style="text-align:left;">Right now? Security work has no gravity. It&#39;s everywhere and nowhere.</p><p class="paragraph" style="text-align:left;">And yeah, this connects directly to the single pane of glass conversation. In that post I talked about building your own platform, Lego-style, with assets, data layers, correlation, and response actions. But even if you build that beautiful architecture, it&#39;s still oriented around machine-generated alerts. The SIEM brain, the enrichment layer, the correlation engine. All of that assumes the input is a structured alert.</p><p class="paragraph" style="text-align:left;">What about the IT manager who emails you about a suspicious contractor? What about the audit finding that needs 6 teams to remediate? What about the pen test report sitting in a shared drive that nobody has turned into action items yet?</p><p class="paragraph" style="text-align:left;">That work has no architecture. It has no pipeline. It just shows up and someone deals with it however they can.</p><p class="paragraph" style="text-align:left;">You want to know why security teams always feel understaffed? Part of it is real headcount shortage, sure. But part of it is that nobody can actually see where the time goes. When the most manual, time-consuming work lives outside of every system you&#39;ve built, you can&#39;t measure it. When you can&#39;t measure it, you can&#39;t optimize it. When you can&#39;t optimize it, you just throw more people at it and hope for the best.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6879bc51-230d-406e-a7e2-5af5065d8d49/How_Security_Work_is_generated_.gif?t=1770997543"/></div><h2 class="heading" style="text-align:left;" id="process-mining-exists-just-not-for-">Process Mining Exists. Just Not for Us. Yet.</h2><p class="paragraph" style="text-align:left;">Here&#39;s something that gets me. In finance, procurement, and operations, tools like Celonis and Scribe Optimize have existed for years. They observe how work actually happens across tools and systems. They find bottlenecks. They tell you where time is wasted. They optimize based on data, not vibes and assumptions.</p><p class="paragraph" style="text-align:left;">In security? Still very early days.</p><p class="paragraph" style="text-align:left;">Some vendors are starting to take RPA-style approaches to There&#39;s a handful of academic papers exploring it. But it&#39;s nowhere near mainstream.</p><p class="paragraph" style="text-align:left;">We still don&#39;t have good data on how security work actually flows end to end. Think about that.</p><p class="paragraph" style="text-align:left;">We have terabytes of security telemetry. We can tell you exactly when a process spawned on an endpoint at 3:47am. But we can&#39;t tell you how long it takes an analyst to go from &quot;alert fired&quot; to &quot;investigation complete.&quot; We can&#39;t tell you how much time the team spends on compliance requests versus actual threat work. We can&#39;t tell you which of your 200 detection rules generates the most operational overhead relative to the security value it provides.</p><p class="paragraph" style="text-align:left;">That&#39;s wild.</p><h2 class="heading" style="text-align:left;" id="why-this-is-hard">Why This Is Hard</h2><p class="paragraph" style="text-align:left;">I get why the industry keeps gravitating toward the easier wins. Make investigation faster. Automate the playbook. Build a better ML model for triage. Those are well-defined problems with measurable outcomes.</p><p class="paragraph" style="text-align:left;">Understanding where all security work happens and how it flows? That&#39;s messy. It crosses tool boundaries. It involves human behavior that doesn&#39;t fit neatly into event logs. It requires looking at the whole system, not just one piece.</p><p class="paragraph" style="text-align:left;">This is the hardest problem to solve. And that&#39;s exactly why not many are tackling it yet.</p><p class="paragraph" style="text-align:left;">But here&#39;s why it matters. If you don&#39;t understand the full picture of how work enters and flows through your security team, everything else you build is an optimization of a subsystem. You can make SIEM triage 10x faster, but if a third of the work comes from non-SIEM sources that are entirely manual, you just made one part of the problem better while the messiest part stays untouched.</p><h2 class="heading" style="text-align:left;" id="what-would-actually-help">What Would Actually Help</h2><p class="paragraph" style="text-align:left;">I don&#39;t think this needs to be one giant platform that replaces everything. But teams need a few things that barely exist today.</p><p class="paragraph" style="text-align:left;"><b>Workflow data.</b> How long does each type of work actually take? Where are the handoffs? Where do things stall? What percentage of the team&#39;s time goes to which category of work? Right now most teams are guessing. And the guesses are usually wrong because the most painful work is the least visible.</p><p class="paragraph" style="text-align:left;"><b>Operational impact awareness.</b> Before you deploy a new detection, onboard a new data source, or agree to a new compliance requirement, you should be able to model what that does to your team&#39;s capacity. Not after the fact when everyone&#39;s drowning. Before.</p><p class="paragraph" style="text-align:left;"><b>Connection between detection and process.</b> If you have a detection but you don&#39;t have the analysis path mapped from it, you can&#39;t estimate how it impacts anything downstream. Every detection should ship with its SOP. Not as a nice-to-have. As a requirement.</p><h2 class="heading" style="text-align:left;" id="the-fear-wont-go-away">The Fear Won&#39;t Go Away</h2><p class="paragraph" style="text-align:left;">The Fear of Not Doing Enough will always be there. New threats aren&#39;t going to stop coming. The pressure to have &quot;something&quot; for every new attack vector is real.</p><p class="paragraph" style="text-align:left;">But the answer isn&#39;t to keep throwing generic detections at every new thing and hoping the team can absorb the blast. It&#39;s not to keep building faster investigation tools for one slice of the work while the rest drowns in Slack threads and spreadsheets.</p><p class="paragraph" style="text-align:left;">We&#39;ve been fixing the middle. Investigation is getting faster. AI triage is real. Response automation is improving. The single pane of glass architecture is getting clearer. All good progress.</p><p class="paragraph" style="text-align:left;">Now it&#39;s time to zoom out. Understand how security work actually flows. All of it. Not just the structured, machine-generated part. Especially the messy, manual, human-generated part that eats the most time and has the least tooling.</p><p class="paragraph" style="text-align:left;">Fix the input. Model the cost. Understand the workflow.</p><p class="paragraph" style="text-align:left;">Stop optimizing the output of a system you&#39;ve never fully mapped.</p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-fear-of-not-doing-enough"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=95069dc0-a37c-4e33-8659-01d1fe7c8442&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>The SOC Autonomy Trap</title>
  <description>Why &#39;Fully Autonomous SOC&#39; is a Design Mistake</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/25ca0308-3597-4732-96cd-5eb4f4330ded/Agent_Autonomy_SOC.png" length="1197401" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/the-soc-autonomy-trap</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/the-soc-autonomy-trap</guid>
  <pubDate>Mon, 19 Jan 2026 15:10:07 +0000</pubDate>
  <atom:published>2026-01-19T15:10:07Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Framework]]></category>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">Hey everyone. Been quiet on here for a bit. First post of 2026.<br><br>I came across a paper that finally articulates something I&#39;ve been thinking about for a while: autonomy isn&#39;t a capability score. It&#39;s a design decision<a class="link" href="https://arxiv.org/abs/2506.12469?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-soc-autonomy-trap" target="_blank" rel="noopener noreferrer nofollow">&quot;Levels of Autonomy for AI Agents&quot;</a>. And chasing the highest level everywhere is a mistake.</p><p class="paragraph" style="text-align:left;">Let me walk through it.<br><br><b>L1 (Operator):</b> User directs and makes decisions, agent acts. Think Microsoft Copilot. The agent requires invocation to act, provides on-demand assistance, and avoids preference-based decision-making on the user&#39;s behalf.</p><p class="paragraph" style="text-align:left;"><b>L2 (Collaborator):</b> User and agent collaboratively plan, delegate, and execute. Think OpenAI Operator. Users can freely modify agent work and take control at any point. Back-and-forth communication is frequent.</p><p class="paragraph" style="text-align:left;"><b>L3 (Consultant):</b> Agent takes the lead but consults user for expertise and preferences. Think Gemini Deep Research. Users provide feedback and directional guidance rather than hands-on collaboration. The agent bears more of the learning curve.</p><p class="paragraph" style="text-align:left;"><b>L4 (Approver):</b> Agent engages user only in risky or pre-specified scenarios. Think Devin. Users specify approval conditions upfront. The agent only stops for blockers, credentials, or consequential actions.</p><p class="paragraph" style="text-align:left;"><b>L5 (Observer):</b> Agent operates with full autonomy under user monitoring. Users can watch activity logs and hit the emergency stop. That&#39;s it.</p><p class="paragraph" style="text-align:left;">The key insight: autonomy is a design decision, not a capability metric. A capable agent can still operate at L2 if that&#39;s the right call for the task. The paper explicitly argues against treating autonomy as an inevitable consequence of increasing capability.</p><h2 class="heading" style="text-align:left;" id="agency-vs-autonomy">Agency vs. Autonomy</h2><p class="paragraph" style="text-align:left;">The paper makes an important distinction that matters for security operations.</p><p class="paragraph" style="text-align:left;"><b>Agency</b> is the capacity to carry out intentional actions. It&#39;s about what tools the agent has access to and what it can do in the environment.</p><p class="paragraph" style="text-align:left;"><b>Autonomy</b> is the extent to which the agent operates without user involvement. It&#39;s about when and how the agent checks in with humans.</p><p class="paragraph" style="text-align:left;">An agent with high agency (many tools, broad permissions) can still have low autonomy (checks in frequently). An agent with low agency (limited toolset) can have high autonomy (runs independently within that scope).</p><p class="paragraph" style="text-align:left;">This distinction matters because security teams often conflate the two. Giving an agent access to more data sources (agency) is different from letting it act without approval (autonomy). You can expand agency while constraining autonomy.</p><h2 class="heading" style="text-align:left;" id="mapping-autonomy-to-security-operat">Mapping Autonomy to Security Operations</h2><p class="paragraph" style="text-align:left;">I mapped common security workflows to appropriate autonomy levels based on their risk profile and decision complexity.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/25ca0308-3597-4732-96cd-5eb4f4330ded/Agent_Autonomy_SOC.png?t=1768641564"/></div><h3 class="heading" style="text-align:left;" id="initial-triage-l-4-l-5">Initial Triage: L4-L5</h3><p class="paragraph" style="text-align:left;">For alert triage, scale beats precision. You&#39;re dealing with volume. The goal is filtering, not final judgment.</p><p class="paragraph" style="text-align:left;">L4 makes sense here. Let agents do the heavy lifting, have them seek approval only for edge cases or high-severity alerts. L5 is reasonable for low-fidelity alerts where false positives cost nothing. Start at L4. Keep humans reviewing outcomes for anything that escalates to investigation.</p><p class="paragraph" style="text-align:left;">The paper notes that L4 agents are ideal for tasks with high amounts of lower-stakes decision-making. Alert triage fits this description. Automated decisions improve efficiency. Erroneous decisions on individual alerts don&#39;t impose catastrophic risks if the escalation path is intact.</p><h3 class="heading" style="text-align:left;" id="incident-response-l-1-l-2">Incident Response: L1-L2</h3><p class="paragraph" style="text-align:left;">On the response side of the IR cycle, L1 and L2 work well. These are established patterns with runbooks and playbooks.</p><p class="paragraph" style="text-align:left;">Why keep autonomy low here? Response actions are consequential. Isolating a host, blocking a domain, killing a process. These actions have real impact. Speed matters, but accountability matters more.</p><p class="paragraph" style="text-align:left;">L1 is appropriate when analysts drive the workflow and agents execute specific tasks on command. L2 works when you want the agent to propose containment plans while the analyst retains takeover capability.</p><p class="paragraph" style="text-align:left;">The paper describes L2 control mechanisms as requiring &quot;control transfer from agent to user, and vice versa&quot; plus &quot;shared representation of progress.&quot; That maps well to incident response dashboards where analysts can see what the agent is doing and intervene.</p><h3 class="heading" style="text-align:left;" id="in-depth-investigation-l-3">In-Depth Investigation: L3</h3><p class="paragraph" style="text-align:left;">Deep investigation is judgment-heavy work. Context matters. The analyst brings domain knowledge, institutional memory, and threat intelligence the agent doesn&#39;t have.</p><p class="paragraph" style="text-align:left;">L3 fits this workflow. The agent leads the investigation, gathering data, correlating events, building timelines. But it consults the analyst for direction. What&#39;s the hypothesis? Which threads are worth pulling? Does this pattern match something we&#39;ve seen before?</p><p class="paragraph" style="text-align:left;">The paper notes that L3 agents require &quot;productive and timely consultation.&quot; The agent needs to know what expertise the user brings and when to ask for it. For security investigations, this means the agent should surface findings and ask about relevance rather than drawing conclusions autonomously.</p><h3 class="heading" style="text-align:left;" id="threat-hunting-l-2-l-3">Threat Hunting: L2-L3</h3><p class="paragraph" style="text-align:left;">Hunting is exploratory by nature. You&#39;re looking for things you don&#39;t know exist yet. Hypotheses matter. Intuition matters.</p><p class="paragraph" style="text-align:left;">Collaboration beats full automation here. L2-L3 is the range. The agent surfaces anomalies, suggests investigation paths, runs queries. The human drives the hunt itself.</p><p class="paragraph" style="text-align:left;">The paper describes L2 as the level where &quot;back-and-forth communication between the user and the agent is the most frequent and rich.&quot; Threat hunting benefits from this dynamic. The hunter&#39;s domain expertise combined with the agent&#39;s ability to process large datasets creates a feedback loop that pure automation can&#39;t replicate.</p><h3 class="heading" style="text-align:left;" id="detection-engineering-l-2-l-3">Detection Engineering: L2-L3</h3><p class="paragraph" style="text-align:left;">Detection engineering is systematic but consequential. Bad detections create alert fatigue. Missed detections create gaps.</p><p class="paragraph" style="text-align:left;">L2 is the baseline. The agent assists with query building, suggests detection patterns, helps test against historical data. The engineer retains control over what gets deployed.</p><p class="paragraph" style="text-align:left;">L3 is appropriate for mature teams with well-governed detection lifecycles. The agent drafts detections, runs validation, and consults the engineer before deployment. The key is having proper testing and review controls already in place.</p><p class="paragraph" style="text-align:left;">The paper warns about L4 agents and &quot;meaningless rubber stamping&quot; from user disengagement. This risk is real for detection engineering. If engineers just approve whatever the agent proposes, detection quality will degrade.</p><h2 class="heading" style="text-align:left;" id="the-double-edged-sword">The Double-Edged Sword</h2><p class="paragraph" style="text-align:left;">The paper repeatedly emphasizes that autonomy amplifies both benefits and risks. Higher autonomy means more scale and efficiency. It also means errors compound over multiple steps without intervention.</p><p class="paragraph" style="text-align:left;">This maps directly to security operations. An agent that autonomously closes false positive alerts at L5 saves analyst time. An agent that autonomously closes true positive alerts at L5 creates security incidents.</p><p class="paragraph" style="text-align:left;">The paper also raises concerns about deskilling and loss of critical thinking when automation takes over judgment tasks. Security teams should consider this. If agents handle all investigation, what happens to analyst skill development? L2 and L3 autonomy levels preserve opportunities for human engagement while still providing automation benefits.</p><h2 class="heading" style="text-align:left;" id="autonomy-certificates">Autonomy Certificates</h2><p class="paragraph" style="text-align:left;">The paper proposes &quot;autonomy certificates&quot; as a governance mechanism. A third-party body evaluates an agent&#39;s behavior and certifies the maximum autonomy level at which it can operate.</p><p class="paragraph" style="text-align:left;">This concept has implications for security vendors. Right now, every AI SOC vendor claims some version of autonomous operation. There&#39;s no standard way to compare what that actually means.</p><p class="paragraph" style="text-align:left;">An autonomy certificate framework would force clarity. Does your agent operate at L3 or L4? What approval mechanisms exist? Under what conditions does it escalate?</p><p class="paragraph" style="text-align:left;">For security buyers, this creates better evaluation criteria than vague claims about AI capabilities.</p><h2 class="heading" style="text-align:left;" id="double-layer-governance-reasoning-a">Double-Layer Governance: Reasoning and Abilities</h2><p class="paragraph" style="text-align:left;">The agency vs. autonomy distinction from the paper points to a practical governance model. You need to control both what the agent can think about doing and what it can actually do.</p><p class="paragraph" style="text-align:left;">At BlinkOps, we implement this as double-layer governance:</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/550bc862-e0b3-4024-8f9d-e89782e98594/trust_in_agents.jpeg?t=1768641895"/></div><p class="paragraph" style="text-align:left;"><b>Layer 1: Reasoning Constraints</b></p><p class="paragraph" style="text-align:left;">This layer limits what the agent can decide to do. It&#39;s autonomy governance. You define the scope of problems the agent is allowed to reason about and the types of conclusions it can reach.</p><p class="paragraph" style="text-align:left;">For example, an agent handling alert triage might be constrained to reason only about severity classification and enrichment. It can&#39;t decide to initiate response actions, even if it has the technical capability. The reasoning boundary is set before the agent ever considers what actions to take.</p><p class="paragraph" style="text-align:left;">This maps to the paper&#39;s definition of autonomy as &quot;the extent to which an AI agent is designed to operate without user involvement.&quot; By constraining reasoning scope, you limit how far the agent goes before involving a human.</p><p class="paragraph" style="text-align:left;"><b>Layer 2: Ability Constraints</b></p><p class="paragraph" style="text-align:left;">This layer limits what the agent can execute. It&#39;s agency governance. Even if the agent reasons its way to a valid conclusion, it can only act through explicitly permitted capabilities.</p><p class="paragraph" style="text-align:left;">This is your tool allowlist. The agent might determine that isolating a host is the right response, but if host isolation isn&#39;t in its permitted action set, it can&#39;t execute. It has to escalate.</p><p class="paragraph" style="text-align:left;">This maps to the paper&#39;s definition of agency as &quot;the capacity to carry out intentional actions.&quot; By constraining the toolset, you bound the blast radius of any autonomous decision.</p><p class="paragraph" style="text-align:left;"><b>Why Both Layers Matter</b></p><p class="paragraph" style="text-align:left;">Single-layer governance creates gaps.</p><p class="paragraph" style="text-align:left;">If you only constrain abilities (Layer 2), the agent can still reason about actions outside its scope and make recommendations that push humans toward decisions the agent shouldn&#39;t influence. An agent without response permissions might still conclude &quot;this host should be isolated immediately&quot; and create pressure for hasty action.</p><p class="paragraph" style="text-align:left;">If you only constrain reasoning (Layer 1), the agent might find edge cases where its reasoning scope overlaps with dangerous capabilities. A triage agent reasoning about &quot;enrichment&quot; might decide that querying a production database for context falls within scope.</p><p class="paragraph" style="text-align:left;">Double-layer governance closes both gaps. The reasoning layer defines intent boundaries. The ability layer enforces execution boundaries. An action only happens if it passes both checks.</p><p class="paragraph" style="text-align:left;"><b>Practical Implementation</b></p><p class="paragraph" style="text-align:left;">For each workflow, define:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Reasoning scope:</b> What questions can the agent answer? What conclusions can it reach? What types of decisions are out of bounds?</p></li><li><p class="paragraph" style="text-align:left;"><b>Action permissions:</b> What tools and integrations can the agent invoke? What parameters can it set? What requires human approval?</p></li><li><p class="paragraph" style="text-align:left;"><b>Escalation triggers:</b> When reasoning hits scope boundaries, where does it go? When actions require approval, who approves?</p></li></ol><p class="paragraph" style="text-align:left;">This gives you granular control without blocking automation entirely. An L4 agent can still operate autonomously within its defined scope. But that scope is explicitly bounded at both the reasoning and execution layers.</p><p class="paragraph" style="text-align:left;">The paper&#39;s framework helps here. L4 requires &quot;customizable conditions for seeking approval.&quot; Double-layer governance operationalizes this. The conditions are defined by reasoning scope violations (Layer 1) and action permission requirements (Layer 2).</p><h2 class="heading" style="text-align:left;" id="what-this-means-for-ai-soc-design">What This Means for AI SOC Design</h2><p class="paragraph" style="text-align:left;">If you&#39;re building or buying AI-powered security tooling, ask different questions:</p><p class="paragraph" style="text-align:left;"><b>What autonomy level does this workflow need?</b> Not &quot;how autonomous is this agent?&quot; Match the autonomy to the task risk profile.</p><p class="paragraph" style="text-align:left;"><b>What are the must-have controls?</b> Each autonomy level has required control mechanisms. L4 requires approval elicitation for consequential actions and customizable conditions. L2 requires control transfer mechanisms and shared progress visibility. Verify these exist.</p><p class="paragraph" style="text-align:left;"><b>Where are the approval gates?</b> Every workflow should have defined checkpoints. Know what triggers human involvement.</p><p class="paragraph" style="text-align:left;"><b>What&#39;s the fallback?</b> When the agent hits a failure state, what happens? The paper notes that L4 and L5 agents should iterate on solutions or modify approaches when blocked. How does your agent handle this?</p><p class="paragraph" style="text-align:left;"><b>Who&#39;s accountable?</b> Higher autonomy means harder accountability tracing. The paper cites research showing it&#39;s simultaneously more important and more difficult to anticipate harms from autonomous AI. Design governance around this reality.</p><h2 class="heading" style="text-align:left;" id="closing-thoughts">Closing Thoughts</h2><p class="paragraph" style="text-align:left;">Chasing L5 everywhere is a design mistake, not a strategy.</p><p class="paragraph" style="text-align:left;">The vendors pushing &quot;fully autonomous SOC&quot; are selling a destination most teams shouldn&#39;t want to reach. The right autonomy level varies by task, by maturity, by risk tolerance.</p><p class="paragraph" style="text-align:left;">The paper&#39;s framework gives us a shared vocabulary for these discussions. Use it.</p><hr class="content_break"><p class="paragraph" style="text-align:left;"><b>Reference:</b> Feng, K.J.K., McDonald, D.W., & Zhang, A.X. (2025). <i>Levels of Autonomy for AI Agents</i>. University of Washington. <a class="link" href="https://arxiv.org/abs/2506.12469?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-soc-autonomy-trap" target="_blank" rel="noopener noreferrer nofollow">arXiv:2506.12469</a></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-soc-autonomy-trap"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=7821d167-e086-41be-b8ea-bcabbbacbdea&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Understanding Semantic Layers in Security Operations</title>
  <description>Decode the power of semantic layers in security ops: Learn how explicit data definitions and AI-driven context transform agent intelligence and threat detection accuracy.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b1d479dc-3abd-4c76-94bb-1f537a4495db/Semantic_Layer_1.png" length="2211139" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/understanding-semantic-layers-in-security-operations</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/understanding-semantic-layers-in-security-operations</guid>
  <pubDate>Tue, 09 Dec 2025 13:33:06 +0000</pubDate>
  <atom:published>2025-12-09T13:33:06Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;"><i>Article written in collaboration with </i><a class="link" href="https://www.linkedin.com/in/andrew-green-tech/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=understanding-semantic-layers-in-security-operations" target="_blank" rel="noopener noreferrer nofollow"><i>Andrew Green </i></a></p><p class="paragraph" style="text-align:left;">We often argue over semantics, but your agents shouldn&#39;t. They need explicit definitions for what data and events mean for your business. Otherwise they will refer back to their training data, which is often not applicable.</p><p class="paragraph" style="text-align:left;">For example, a log from an on-prem Cisco router and an AWS VPC log are structured differently, but they both contain IP addresses, ports, protocols. An LLM can understand what these network elements mean and make general inferences about network requests. But how will it determine which instances of traffic between your on-prem environment and cloud are expected versus suspicious?</p><p class="paragraph" style="text-align:left;">You&#39;ve got three options here.</p><p class="paragraph" style="text-align:left;">The first one is to ask the LLM: &#39;Hey, is this suspicious?&#39;, at which point the LLM will be using its training data and prompt context to give a statistically likely interpretation. This is the neural approach.</p><p class="paragraph" style="text-align:left;">The second one is to define an explicit rule, such as alert if request.source_ip in &quot;10.0.0.0/8&quot; and request.destination_ip in &quot;52.0.0.0/8&quot;. This is the symbolic approach.</p><p class="paragraph" style="text-align:left;">The third one is to tell the LLM: &#39;Hey, our dev Jerry had a leg surgery and he won&#39;t leave the house while he heals, but he&#39;ll be working from home&#39;. With the right tools, the LLM will now interpret the ambiguities of this message and combine them with hard rules to define an explicit instruction, where all of Jerry&#39;s access requests will be made from his VPN for the next 6 months, while anything else is suspicious. This is the neurosymbolic approach.</p><p class="paragraph" style="text-align:left;">To get to this third option, we need a semantic layer.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b1d479dc-3abd-4c76-94bb-1f537a4495db/Semantic_Layer_1.png?t=1764949032"/></div><h2 class="heading" style="text-align:left;" id="the-fundamental-tension-why-we-need"><b>The Fundamental Tension: Why We Need Semantic Layers</b></h2><p class="paragraph" style="text-align:left;">Before we define what semantic layers are, let&#39;s understand the problem they&#39;re solving. There&#39;s a fundamental tension in how we approach automated reasoning in security:</p><p class="paragraph" style="text-align:left;"><b>Pure Neural (LLM) Approach:</b></p><ul><li><p class="paragraph" style="text-align:left;">Excellent at pattern recognition and handling ambiguity</p></li><li><p class="paragraph" style="text-align:left;">Can process natural language queries</p></li><li><p class="paragraph" style="text-align:left;">Adaptable to new situations</p></li><li><p class="paragraph" style="text-align:left;">BUT: Non-deterministic, expensive at scale, can&#39;t explain decisions</p></li></ul><p class="paragraph" style="text-align:left;"><b>Pure Symbolic Approach:</b></p><ul><li><p class="paragraph" style="text-align:left;">Deterministic and auditable</p></li><li><p class="paragraph" style="text-align:left;">Fast and efficient at scale</p></li><li><p class="paragraph" style="text-align:left;">Provides clear reasoning chains</p></li><li><p class="paragraph" style="text-align:left;">BUT: Brittle with edge cases, requires extensive rule maintenance</p></li></ul><p class="paragraph" style="text-align:left;">The semantic layer provides a foundation for hybrid approaches where symbolic reasoning handles the facts and constraints while neural networks handle the ambiguity and interface. It&#39;s the bridge between &quot;Jerry is working from home while recovering&quot; (natural language) and &quot;source_ip = Jerry_VPN_IP AND time_range = next_6_months&quot; (executable logic).</p><h2 class="heading" style="text-align:left;" id="but-what-is-a-semantic-layer-exactl"><b>But What Is a Semantic Layer, Exactly?</b></h2><p class="paragraph" style="text-align:left;">A semantic layer is an LLM-queriable abstraction layer that pulls and correlates information about entities, their relationships, and the deterministic rules that govern their interactions. </p><p class="paragraph" style="text-align:left;">It correlates raw technical data with business meaning through symbolic reasoning.</p><p class="paragraph" style="text-align:left;">But what is symbolic reasoning?</p><p class="paragraph" style="text-align:left;">Actually, what is a symbol?</p><p class="paragraph" style="text-align:left;">A symbol is a notation that captures the meaning of a concept, such as &#39;putting two things together&#39; is expressed by the symbol &#39;+&#39;. Humans and LLMs can use these symbols to read and define rules and instructions.</p><p class="paragraph" style="text-align:left;">Symbolic reasoning therefore uses these notations to work out a conclusion.</p><p class="paragraph" style="text-align:left;">At its core, a semantic layer must define the following three concepts:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Entities:</b> identities (both human and workload), assets such as servers and applications, events like a GET request, and behaviors such as Dev (identity) makes a POST request (event) to a database (asset).<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Relationships</b> also known as relationship graphs or knowledge graphs, these map things like User X manages Asset Y, Asset Y hosts Application Z, Application Z processes Data Type W, Data Type W is subject to Regulation V.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Symbolic Reasoning</b><b>:</b> applying logic-based rules. You can trace exactly why a decision was made. Every step is auditable, testable, and deterministic.<br><br> a. IF user.role = &quot;contractor&quot;<br><br> b. AND access.time NOT IN business_hours<br><br> c. AND asset.classification = &quot;confidential&quot;<br><br> d. THEN risk_score = HIGH<br></p></li></ol><h2 class="heading" style="text-align:left;" id="where-should-semantic-layers-live"><b>Where Should Semantic Layers Live?</b></h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/42902eb7-c1ad-4ce6-9d92-8d2dda620637/Sematic_Layer_2.png?t=1764949081"/></div><p class="paragraph" style="text-align:left;">Considering most security activities revolve around gathering accurate and relevant data, where in the modern SecOps stack should this semantic layer be inserted?This is where theory meets painful reality, and where practitioners diverge sharply on the right approach.</p><p class="paragraph" style="text-align:left;">There are four main architectural positions, each with compelling arguments and serious tradeoffs:</p><h3 class="heading" style="text-align:left;" id="option-1-in-the-data-pipeline-pre-s"><b>Option 1: In the Data Pipeline (Pre-SIEM)</b></h3><p class="paragraph" style="text-align:left;">The argument here is to do semantic processing before data ever reaches your SIEM or data lake.</p><p class="paragraph" style="text-align:left;"><b>Advantages:</b></p><ul><li><p class="paragraph" style="text-align:left;">Reduces data volume through intelligent filtering</p></li><li><p class="paragraph" style="text-align:left;">Normalizes entities at the source</p></li><li><p class="paragraph" style="text-align:left;">Cheaper than processing in expensive SIEM platforms</p></li><li><p class="paragraph" style="text-align:left;">Can route data based on semantic understanding</p></li></ul><p class="paragraph" style="text-align:left;"><b>Challenges:</b></p><ul><li><p class="paragraph" style="text-align:left;">Requires real-time processing at massive scale</p></li><li><p class="paragraph" style="text-align:left;">Changes to semantic models require pipeline updates</p></li><li><p class="paragraph" style="text-align:left;">Limited context (can&#39;t look at historical data easily)</p></li><li><p class="paragraph" style="text-align:left;">Becomes another system to maintain</p></li></ul><p class="paragraph" style="text-align:left;"><b>Verdict:</b> This works well for basic entity resolution and enrichment, but struggles with complex relationship modeling that requires historical context.</p><h3 class="heading" style="text-align:left;" id="option-2-within-the-siem-platform"><b>Option 2: Within the SIEM Platform</b></h3><p class="paragraph" style="text-align:left;">Modern SIEMs increasingly claim to embed semantic capabilities directly.</p><p class="paragraph" style="text-align:left;"><b>Advantages:</b></p><ul><li><p class="paragraph" style="text-align:left;">Integrated with detection and investigation workflows</p></li><li><p class="paragraph" style="text-align:left;">Access to all historical data for context</p></li><li><p class="paragraph" style="text-align:left;">Single platform to manage</p></li><li><p class="paragraph" style="text-align:left;">Vendor support (in theory)</p></li></ul><p class="paragraph" style="text-align:left;"><b>Challenges:</b></p><ul><li><p class="paragraph" style="text-align:left;">Vendor lock-in to proprietary semantic models</p></li><li><p class="paragraph" style="text-align:left;">Performance impacts on already-stressed SIEMs</p></li><li><p class="paragraph" style="text-align:left;">Limited flexibility in modeling</p></li><li><p class="paragraph" style="text-align:left;">Expensive processing at SIEM rates</p></li></ul><p class="paragraph" style="text-align:left;"><b>Verdict:</b> most SIEM vendors are adding &quot;semantic&quot; features, but they&#39;re often just rebranded lookup tables and data models. True semantic reasoning with relationship graphs and symbolic logic remains limited. XDR vendors have marketed this capability more aggressively, positioning themselves as solving the &quot;semantic gap&quot; problem, but implementation depth varies significantly.</p><h3 class="heading" style="text-align:left;" id="option-3-as-a-separate-analytics-la"><b>Option 3: As a Separate Analytics Layer</b></h3><p class="paragraph" style="text-align:left;">Building a semantic layer that operates alongside or on top of your security data infrastructure.</p><p class="paragraph" style="text-align:left;"><b>Advantages:</b></p><ul><li><p class="paragraph" style="text-align:left;">Flexibility to model your specific environment</p></li><li><p class="paragraph" style="text-align:left;">Can work across multiple data sources</p></li><li><p class="paragraph" style="text-align:left;">Optimized for complex reasoning</p></li><li><p class="paragraph" style="text-align:left;">Natural fit for AI/ML integration</p></li></ul><p class="paragraph" style="text-align:left;"><b>Challenges:</b></p><ul><li><p class="paragraph" style="text-align:left;">Another platform to integrate and maintain</p></li><li><p class="paragraph" style="text-align:left;">Potential latency for real-time use cases</p></li><li><p class="paragraph" style="text-align:left;">Requires data federation or complex APIs</p></li><li><p class="paragraph" style="text-align:left;">Organizational boundaries (who owns it?)</p></li></ul><p class="paragraph" style="text-align:left;"><b>Verdict:</b> This is where most successful implementations end up, but it requires significant investment and organizational commitment. Some SOAR platforms have evolved toward this model, building semantic layers with automation workflows and embedding business context in case management. AI SOC platforms are also exploring this space, though many are still in early stages of true semantic reasoning versus simple enrichment.</p><h3 class="heading" style="text-align:left;" id="option-4-distributed-semantic-proce"><b>Option 4: Distributed Semantic Processing</b></h3><p class="paragraph" style="text-align:left;">The most ambitious approach - semantic capabilities distributed throughout your stack, with processing happening wherever it makes most sense.</p><p class="paragraph" style="text-align:left;"><b>Advantages:</b></p><ul><li><p class="paragraph" style="text-align:left;">Process data where it makes most sense</p></li><li><p class="paragraph" style="text-align:left;">No single point of failure</p></li><li><p class="paragraph" style="text-align:left;">Can optimize for different use cases</p></li><li><p class="paragraph" style="text-align:left;">Scales naturally with infrastructure</p></li></ul><p class="paragraph" style="text-align:left;"><b>Challenges:</b></p><ul><li><p class="paragraph" style="text-align:left;">Consistency across distributed models</p></li><li><p class="paragraph" style="text-align:left;">Complex orchestration and governance</p></li><li><p class="paragraph" style="text-align:left;">Difficult to maintain and update</p></li><li><p class="paragraph" style="text-align:left;">Requires sophisticated engineering</p></li></ul><p class="paragraph" style="text-align:left;"><b>Verdict:</b> This is the &quot;microservices of semantic layers&quot; - sounds great in theory, nightmarish in practice for most organizations. You need mature DevOps practices and significant engineering resources to make this work.</p><h2 class="heading" style="text-align:left;" id="how-semantic-layer-projects-fail"><b>How Semantic Layer Projects Fail</b></h2><p class="paragraph" style="text-align:left;">Let&#39;s be honest about the failure modes, because understanding these is more valuable than any architecture diagram:</p><p class="paragraph" style="text-align:left;"><b>1. Trying to Model Everything</b></p><p class="paragraph" style="text-align:left;">Organizations attempt to create comprehensive ontologies of their entire environment. This is impossibly complex and never finishes. You don&#39;t need a complete knowledge graph of your infrastructure to get value from semantic layers. But you do not explicit information about what is modeled and what is not.</p><p class="paragraph" style="text-align:left;"><b>2. Ignoring Organizational Reality</b></p><p class="paragraph" style="text-align:left;">Semantic models require agreement on basic concepts like &quot;what is a critical asset?&quot; Most organizations can&#39;t even agree on this informally, much less formally model it. The technical challenge is often easier than the political one.</p><p class="paragraph" style="text-align:left;"><b>3. Underestimating Maintenance</b></p><p class="paragraph" style="text-align:left;">Semantic models aren&#39;t write-once. They require constant updates as your environment evolves. Without dedicated resources, they become stale and useless within months.</p><p class="paragraph" style="text-align:left;"><b>4. Over-Engineering the Solution</b></p><p class="paragraph" style="text-align:left;">Building elaborate graph databases and reasoning engines when simple lookup tables would suffice for 80% of use cases. Start with the minimum viable semantic layer that solves your specific problems.</p><p class="paragraph" style="text-align:left;"><b>5. Lacking Clear Use Cases</b></p><p class="paragraph" style="text-align:left;">Implementing semantic layers because they sound advanced, not because they solve specific problems. &quot;We need better context&quot; isn&#39;t a use case - &quot;We need to automatically identify which database access is anomalous based on team structure and data classification&quot; is.</p><h2 class="heading" style="text-align:left;" id="the-practical-path-forward"><b>The Practical Path Forward</b></h2><p class="paragraph" style="text-align:left;">If you&#39;re considering implementing semantic capabilities, here&#39;s what actually works:</p><p class="paragraph" style="text-align:left;"><b>Start Small and Specific</b></p><p class="paragraph" style="text-align:left;">Pick one use case with clear business value. User-to-asset relationship modeling for access analysis. Application dependency mapping for incident scope. Data classification for DLP prioritization. Prove value before expanding.</p><p class="paragraph" style="text-align:left;"><b>Embrace Imperfect Models</b></p><p class="paragraph" style="text-align:left;">Your semantic layer doesn&#39;t need to be complete or perfect. Even modeling 60% of your critical relationships provides massive value over having none. Accept that edge cases will exist.</p><p class="paragraph" style="text-align:left;"><b>Build for Maintenance</b></p><p class="paragraph" style="text-align:left;">Plan for model updates from day one. Who owns entity definitions? How do relationships get updated? What&#39;s the approval process for changes? The technical implementation is secondary to the governance model.</p><p class="paragraph" style="text-align:left;"><b>Leverage Standards Where Possible</b></p><p class="paragraph" style="text-align:left;">Don&#39;t reinvent entity definitions that already exist. Frameworks like OCSF provide common semantic models that reduce custom development. Think of these as starting points, not constraints.</p><p class="paragraph" style="text-align:left;"><b>Consider Buy vs Build Carefully</b></p><p class="paragraph" style="text-align:left;">Building custom semantic layers requires significant engineering investment. Many organizations would be better served by vendor solutions, even with their limitations. Be honest about your capabilities and resources.<br><br><b>As well some great resources: </b><br><a class="link" href="https://www.holistics.io/books/setup-analytics/data-modeling-layer-and-concepts/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=understanding-semantic-layers-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">https://www.holistics.io/books/setup-analytics/data-modeling-layer-and-concepts/</a></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.datacamp.com/blog/semantic-layer?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=understanding-semantic-layers-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">https://www.datacamp.com/blog/semantic-layer</a></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/html/2506.17512v1?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=understanding-semantic-layers-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">https://arxiv.org/html/2506.17512v1</a></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/html/2510.16610v1?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=understanding-semantic-layers-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">https://arxiv.org/html/2510.16610v1</a></p><h2 class="heading" style="text-align:left;" id="speculation-on-the-future-of-semant"><b>Speculation on The Future of Semantic Layers in Security</b></h2><p class="paragraph" style="text-align:left;">Looking ahead, semantic layers will evolve in three key directions:</p><p class="paragraph" style="text-align:left;"><b>Standardization</b></p><p class="paragraph" style="text-align:left;">Common semantic models will reduce the need for custom development. We&#39;ll share entity definitions and relationship structures like we share threat intelligence today. OCSF and similar frameworks are laying this groundwork.</p><p class="paragraph" style="text-align:left;"><b>Automation</b></p><p class="paragraph" style="text-align:left;">ML will help maintain semantic models by learning from patterns and proposing updates. Instead of manually defining every relationship, you&#39;ll validate what the system discovers. Humans will shift from creation to curation.</p><p class="paragraph" style="text-align:left;"><b>Distributed Intelligence</b></p><p class="paragraph" style="text-align:left;">Rather than centralizing all semantic reasoning in one layer, we&#39;ll see semantic capabilities embedded throughout security infrastructure. Your EDR will understand user context, your SIEM will reason about asset relationships, your SOAR will make decisions based on business impact. The semantic layer becomes infrastructure, not a product.</p><p class="paragraph" style="text-align:left;">The organizations that succeed won&#39;t be those with the most sophisticated semantic models, but those that solve specific problems with appropriately scoped semantic reasoning. Start with Jerry and his VPN, not with a complete ontology of your enterprise.</p><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=understanding-semantic-layers-in-security-operations"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=c60744a6-7e47-4a1c-bce2-c571dfd4de78&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Can AI Drive Response?</title>
  <description>Why the Right Side Still Needs Forensics and Automation</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6fd9a7ab-32cd-4f61-94f3-6f2c699e1676/Why_the_Right_Side_Still_Needs_Forensics_and_Automation_.gif" length="435859" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/can-ai-drive-response</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/can-ai-drive-response</guid>
  <pubDate>Tue, 11 Nov 2025 13:31:14 +0000</pubDate>
  <atom:published>2025-11-11T13:31:14Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Framework]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><hr class="content_break"><p class="paragraph" style="text-align:left;">This is Part 2 of the SOC Reality Check series. In <a class="link" href="https://www.cybersec-automation.com/p/soc-reality-check?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=can-ai-drive-response" target="_blank" rel="noopener noreferrer nofollow">Part 1</a>, I explained how we&#39;ve made incredible progress on the middle (investigation/triage) and we&#39;re improving the left (detection engineering), but this success revealed a new bottleneck: the right side of the IR cycle. Now let&#39;s talk about what it actually takes to solve it, and what becomes possible when you do.</p><p class="paragraph" style="text-align:left;">Let me start where Part 1 ended: <b>We&#39;re actually winning at AI-powered security operations.</b></p><p class="paragraph" style="text-align:left;">The middle is getting better and better, and the left is improving. But the right side, forensics, response, and recovery, is still the bottleneck.</p><p class="paragraph" style="text-align:left;">In Part 1, I showed you what that bottleneck looks like. <b>But here&#39;s what I didn&#39;t talk about: what becomes possible when you solve it.</b></p><p class="paragraph" style="text-align:left;">Because the right side isn&#39;t just about faster response. It&#39;s about unlocking an entirely different way of operating your SOC, one where your team actually has time to hunt for threats proactively, validate your detections continuously, and improve your security posture measurably.</p><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:rgb(15, 60, 113);"><b>Binalyze</b></span></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><div class="image"><a class="image__link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" rel="noopener" target="_blank"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/256e743b-3459-42af-84a4-ebd7005ba91b/Binalyzelogo.png?t=1762201528"/></a></div></td><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td></tr></table></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:center;"><span style="color:rgb(33, 33, 33);font-family:Arial, Helvetica, sans-serif;font-size:1.5rem;"><b>Investigate cyber threats in minutes</b></span></p></div><p class="paragraph" style="text-align:center;"><span style="color:rgb(33, 33, 33);font-size:11pt;"><b>AI-powered speed. Human-driven insight.</b></span></p><p class="paragraph" style="text-align:center;"><span style="color:rgb(33, 33, 33);font-size:11pt;"><b>Binalyze AIR is the forensic investigation automation platform accelerating incident response with AI precision – fast. </b></span></p><p class="paragraph" style="text-align:center;"><span style="color:rgb(34, 34, 34);font-family:Arial, Helvetica, sans-serif;font-size:14.6667px;"><b>Learn more at - [</b></span><span style="color:rgb(34, 34, 34);font-family:Arial, Helvetica, sans-serif;font-size:14.6667px;"><b><a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow">Link</a></b></span><span style="color:rgb(34, 34, 34);font-family:Arial, Helvetica, sans-serif;font-size:14.6667px;"><b>]</b></span></p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="why-ai-alone-cant-drive-response"><b>Why AI Alone Can&#39;t Drive Response</b></h2><p class="paragraph" style="text-align:left;">Let me be very clear: <b>AI is incredibly valuable for the right side, but only if you have the forensic automation infrastructure underneath it.</b></p><p class="paragraph" style="text-align:left;">I keep seeing vendors pitch &quot;AI-driven response&quot; and &quot;autonomous remediation.&quot; Here&#39;s what they usually mean: automated containment like blocking an IP, quarantining an endpoint, or disabling a user account.</p><p class="paragraph" style="text-align:left;"><b>Here&#39;s what they don&#39;t mean:</b> Actually collecting forensic evidence. Understanding the full scope of the compromise. Hunting for related activity across the environment. Preserving artifacts before they&#39;re overwritten.</p><p class="paragraph" style="text-align:left;">AI can help you decide what to investigate and recommend actions. It can correlate patterns and suggest attack paths. <b>That&#39;s the brainwork, and AI is genuinely good at it.</b></p><p class="paragraph" style="text-align:left;">But AI cannot collect memory dumps before the evidence is overwritten. It can&#39;t preserve forensic artifacts across Windows, Linux, macOS, and cloud consistently. It can&#39;t ensure chain of custody. It can&#39;t guarantee complete evidence instead of just whatever happened to be available.</p><p class="paragraph" style="text-align:left;"><b>AI is the brain that decides what to do. Forensic automation is the hands that actually do it.</b> You need both, and right now most organizations only have the brain.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6fd9a7ab-32cd-4f61-94f3-6f2c699e1676/Why_the_Right_Side_Still_Needs_Forensics_and_Automation_.gif?t=1762445037"/></div><h2 class="heading" style="text-align:left;" id="what-forensic-automation-actually-e"><b>What Forensic Automation Actually Enables</b></h2><p class="paragraph" style="text-align:left;">Most people think forensic automation is just about &quot;collecting evidence faster&quot;, cutting the collection time from 4 hours to 15 minutes.</p><p class="paragraph" style="text-align:left;"><b>That&#39;s only 20% of the value.</b> The other 80% is what it unlocks downstream.</p><h3 class="heading" style="text-align:left;" id="you-can-finally-afford-to-be-thorou"><b>You Can Finally Afford to Be Thorough</b></h3><p class="paragraph" style="text-align:left;">Your AI SOC platform does an amazing job. It investigates 1,000 alerts per day, closes 700 as benign, and escalates 100 as True Positive or Inconclusive. Your dashboards look fantastic.</p><p class="paragraph" style="text-align:left;"><b>But here&#39;s what&#39;s actually happening:</b> Your team looks at those 100 escalated alerts and realizes manual evidence collection takes 2-4 hours per incident. With 6-8 analysts on shift, they can properly investigate maybe 10-15 incidents with complete forensics.</p><p class="paragraph" style="text-align:left;">So what happens to the other 85? <b>You triage, you prioritize, you make judgment calls.</b> &quot;This one is probably just noise, close it.&quot; &quot;This one is non-critical, deprioritize.&quot;</p><p class="paragraph" style="text-align:left;"><b>You&#39;re rationing investigation capacity.</b></p><p class="paragraph" style="text-align:left;">Now, imagine the math changes completely. Evidence collection happens automatically in 5-15 minutes, triggered by alert severity. By the time an analyst looks at the incident, all forensic artifacts are already collected and waiting.</p><p class="paragraph" style="text-align:left;"><b>Suddenly you can be thorough with everything.</b> You&#39;re no longer choosing which threats are &quot;worth&quot; deep investigation, you investigate all of them.<br></p><hr class="content_break"><p class="paragraph" style="text-align:left;">Related to this blog, there is a podcast episode, check it out: </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/FDbR3yVuEPA" width="100%"></iframe><h3 class="heading" style="text-align:left;" id="you-can-validate-your-a-is-accuracy"><b>You Can Validate Your AI&#39;s Accuracy</b></h3><p class="paragraph" style="text-align:left;">Here&#39;s what keeps me up at night: <b>How do you actually know if your AI is making correct decisions?</b></p><p class="paragraph" style="text-align:left;">Of those alerts your AI closed as &quot;benign&quot; with 95% confidence, how many did you validate with forensic evidence? Most organizations have no idea. The AI says &quot;95% confident,&quot; you trust it (because you don&#39;t have capacity to investigate manually), and the alert gets closed.</p><p class="paragraph" style="text-align:left;"><b>This is flying blind with extra steps.</b></p><p class="paragraph" style="text-align:left;">With automated forensic collection, you can close this loop. AI flags True Positive → Forensics collected automatically → Human validates with evidence → Results feed back to improve AI. Without forensic automation, this loop is broken.</p><h2 class="heading" style="text-align:left;" id="from-reactive-firefighting-to-proac"><b>From Reactive Firefighting to Proactive Hunting</b></h2><p class="paragraph" style="text-align:left;">When your team isn&#39;t drowning in manual evidence collection, something amazing becomes possible: <b>they can finally do proactive work that actually improves security posture.</b></p><p class="paragraph" style="text-align:left;">Let me show you what I mean.</p><h3 class="heading" style="text-align:left;" id="the-reactive-soc-where-most-teams-a"><b>The Reactive SOC: Where Most Teams Are Stuck</b></h3><p class="paragraph" style="text-align:left;">Your analyst arrives at 8:00 AM, checks overnight alerts. Spends the morning manually collecting evidence, SSH into systems, running scripts, hoping logs haven&#39;t rotated. By lunch, they&#39;ve collected partial evidence from a few systems. Afternoon brings more alerts, more manual collection, more coordination. By 5:00 PM, they go home exhausted.</p><p class="paragraph" style="text-align:left;"><b>Time spent on proactive threat hunting: zero.</b></p><h3 class="heading" style="text-align:left;" id="the-proactive-soc-what-becomes-poss"><b>The Proactive SOC: What Becomes Possible</b></h3><p class="paragraph" style="text-align:left;">Same analyst, different infrastructure. By 9:00 AM, they&#39;ve reviewed pre-collected evidence for all overnight incidents. Five are malicious, containment actions executed. Three are false positives, feedback logged. By 10:00 AM, incidents are handled.</p><p class="paragraph" style="text-align:left;"><b>Now they actually have time for proactive work.</b></p><p class="paragraph" style="text-align:left;">10 AM to 12 PM: Hypothesis-driven threat hunting. 1 PM to 3 PM: Detection engineering based on findings. 3 PM to 5 PM: Purple team validation exercises.</p><p class="paragraph" style="text-align:left;"><b>5:00 PM: They go home having actually improved security posture</b>, not just responded to what already happened.</p><h2 class="heading" style="text-align:left;" id="real-world-example-hunting-for-glas"><b>Real-World Example: Hunting for Glassworm</b></h2><p class="paragraph" style="text-align:left;">Let me walk you through a real scenario. In January 2025, security researchers disclosed <b>Glassworm</b>, the first self-propagating worm using &quot;invisible code&quot; that hit VSCode marketplaces. This is a supply chain attack targeting developer environments.</p><p class="paragraph" style="text-align:left;">What makes Glassworm nasty: it spreads through malicious VSCode extensions that look legitimate. Malicious code is hidden using zero-width characters. Once installed, it can steal credentials, propagate through git repositories, and establish persistence.</p><p class="paragraph" style="text-align:left;"><b>The problem:</b> Most organizations have zero visibility into what VSCode extensions developers install. It&#39;s not something EDR monitors closely. Developers install extensions all the time, it&#39;s normal behavior.</p><h3 class="heading" style="text-align:left;" id="the-reactive-approach-waiting-for-s"><b>The Reactive Approach: Waiting for Something Bad to Happen</b></h3><p class="paragraph" style="text-align:left;">Someone reads about Glassworm on Twitter. &quot;We should probably check if we&#39;re vulnerable.&quot; Added to backlog.</p><p class="paragraph" style="text-align:left;">Two weeks later, a developer tickets IT: &quot;My system is acting weird.&quot; The ticket sits in the queue for days, it&#39;s not high priority.</p><p class="paragraph" style="text-align:left;">Eventually, an analyst investigates. They check EDR logs for that one system. VSCode is making unusual network connections, but is that malicious? They don&#39;t have forensic artifacts to tell. They ask the developer what extensions are installed, the developer lists five they remember, but there are actually twelve installed.</p><p class="paragraph" style="text-align:left;">How do you investigate a VSCode extension? They&#39;re just directories of JavaScript files. Is the code malicious? This investigation is going nowhere.</p><p class="paragraph" style="text-align:left;">Meanwhile, the worm has been propagating for three weeks through git repositories. Other developers got infected. Nobody knows the full scope.</p><p class="paragraph" style="text-align:left;"><b>This is what happens when you&#39;re purely reactive.</b></p><h3 class="heading" style="text-align:left;" id="the-proactive-approach-hunting-befo"><b>The Proactive Approach: Hunting Before It Becomes an Incident</b></h3><p class="paragraph" style="text-align:left;">It&#39;s Monday morning, January 20th. The security team reads about Glassworm disclosed over the weekend. Instead of adding it to backlog: <b>&quot;Let&#39;s hunt for this right now.&quot;</b></p><p class="paragraph" style="text-align:left;">Now, you might be thinking: &quot;Wait, can&#39;t I do this hunt with my EDR?&quot; And you&#39;d be partially right. <b>Yes, your EDR has some of this telemetry</b>, process execution logs, network connections, maybe even some file system activity if you&#39;re collecting it.</p><p class="paragraph" style="text-align:left;">But here&#39;s where it gets complicated:</p><p class="paragraph" style="text-align:left;">Your EDR covers the 347 Windows and Mac developer workstations with agents installed. Great. But what about the 45 Linux developer boxes that use a different EDR agent with a different console? Or the 20 cloud development environments that don&#39;t have traditional endpoints? Or the containerized dev environments that spin up and down?</p><p class="paragraph" style="text-align:left;"><b>You&#39;re already in three different tools.</b></p><p class="paragraph" style="text-align:left;">Now let&#39;s say you start hunting in your EDR console. You query for VSCode process execution across all endpoints. Your EDR retention is 90 days if you&#39;re lucky (and paying premium for that). The Glassworm disclosure mentions extensions installed three months ago. <b>You might be outside your retention window for the initial infection.</b></p><p class="paragraph" style="text-align:left;">You find some VSCode processes making unusual network connections. Good! But to investigate the actual extension code, you need file system artifacts, the extension directories, the JavaScript files, the package.json configs. Does your EDR collect that level of disk forensics? Maybe for specific directories you&#39;ve configured, but did you tell it to monitor VSCode extension folders six months ago? Probably not.</p><p class="paragraph" style="text-align:left;">Now you want to check persistence mechanisms. You pivot to your SIEM to search Windows event logs for scheduled tasks. Oh, but you need to correlate those with the specific VSCode processes you found in EDR. <b>You&#39;re copy-pasting process IDs and timestamps between tools.</b></p><p class="paragraph" style="text-align:left;">You want to see what git repositories the infected systems accessed, because the worm propagates through git. That data might be in your network monitoring tool or proxy logs. <b>Now you&#39;re in a fourth tool</b>, trying to correlate timestamps again.</p><p class="paragraph" style="text-align:left;">And let&#39;s say you find evidence of compromise. Now you need to preserve it properly for potential legal proceedings with proper chain of custody. Your EDR wasn&#39;t really designed for that, it&#39;s a detection and response tool, not an evidence management system.</p><p class="paragraph" style="text-align:left;"><b>This is what I mean by &quot;might be limited and you need to jump to multiple tools.&quot;</b></p><h3 class="heading" style="text-align:left;" id="why-unified-forensic-automation-cha"><b>Why Unified Forensic Automation Changes This</b></h3><p class="paragraph" style="text-align:left;">With forensic automation platform collecting data across all your systems, not just endpoints with EDR agents, the hunt looks different:</p><p class="paragraph" style="text-align:left;"><b>First query: What VSCode extensions are installed across all developer systems?</b></p><p class="paragraph" style="text-align:left;">One query. One platform. Covers Windows, Mac, Linux, cloud instances, containers, everything. Results in minutes: 1,240 unique extensions across 412 total systems (not just the 347 your EDR covers).</p><p class="paragraph" style="text-align:left;">The forensic platform has been collecting file system artifacts continuously, not just process executions, but actual extension files, configuration, modification timestamps. You can see exactly what&#39;s installed, when it was installed, and examine the actual code if needed.</p><p class="paragraph" style="text-align:left;"><b>Second query: What network connections are VSCode processes making?</b></p><p class="paragraph" style="text-align:left;">Same platform. Network forensics correlated automatically with process data. No pivoting to another tool. You&#39;re seeing unusual patterns on 12 systems.</p><p class="paragraph" style="text-align:left;"><b>Third query: What persistence mechanisms were created by VSCode processes?</b></p><p class="paragraph" style="text-align:left;">Same platform. Scheduled tasks, startup items, cron jobs, all correlated with the processes that created them. You don&#39;t need to manually match timestamps across three different tools.</p><p class="paragraph" style="text-align:left;"><b>All of this in one investigation workspace.</b> The forensic artifacts are preserved with proper chain of custody. Retention isn&#39;t limited to 90 days, you have historical data going back as far as you need for compliance.</p><p class="paragraph" style="text-align:left;">You find 12 compromised systems across all your development infrastructure, including three Linux boxes and two cloud instances your EDR doesn&#39;t cover.</p><p class="paragraph" style="text-align:left;"><b>This is why &quot;EDR has logs&quot; isn&#39;t the complete answer.</b> EDR is fantastic for what it does, but it&#39;s not designed to be a comprehensive forensic investigation and hunting platform. It&#39;s designed for endpoint detection and response.</p><h3 class="heading" style="text-align:left;" id="the-tool-sprawl-problem"><b>The Tool Sprawl Problem</b></h3><p class="paragraph" style="text-align:left;">Here&#39;s what hunting looks like in most organizations today, even with good EDR:</p><ul><li><p class="paragraph" style="text-align:left;"><b>EDR console:</b> Process execution, network connections (for systems with agents)</p></li><li><p class="paragraph" style="text-align:left;"><b>SIEM:</b> Log aggregation, scheduled tasks, authentication events</p></li><li><p class="paragraph" style="text-align:left;"><b>Network monitoring tools:</b> Proxy logs, DNS, NetFlow</p></li><li><p class="paragraph" style="text-align:left;"><b>Identity systems:</b> Account access patterns, privilege changes</p></li><li><p class="paragraph" style="text-align:left;"><b>Cloud security tools:</b> Cloud workload activity</p></li><li><p class="paragraph" style="text-align:left;"><b>Vulnerability scanner:</b> Patch status, software inventory</p></li></ul><p class="paragraph" style="text-align:left;">When you hunt, you&#39;re pivoting across all of these, manually correlating timestamps and indicators. Copy-paste investigation. It works, but it&#39;s slow, error-prone, and doesn&#39;t scale when you need to hunt across thousands of systems in two hours.</p><p class="paragraph" style="text-align:left;"><b>Forensic automation platforms consolidate this.</b> Not by replacing your EDR or SIEM, but by providing a unified collection and investigation layer on top of them. You&#39;re still using your EDR for real-time detection and response. But when you need to hunt or do deep investigation, you have one place where all the forensic artifacts live, properly correlated, with extended retention.</p><h3 class="heading" style="text-align:left;" id="the-detection-engineering-payoff"><b>The Detection Engineering Payoff</b></h3><p class="paragraph" style="text-align:left;">After the hunt, the team asks: &quot;Why didn&#39;t our detections fire for this?&quot; They had EDR monitoring, but weren&#39;t specifically looking at VSCode extension installations or obfuscated code execution from extension directories.</p><p class="paragraph" style="text-align:left;"><b>New detection built:</b> Monitor for VSCode extensions from non-verified publishers making unusual network connections or creating persistence. Tuned using the forensic data they collected, tested against the twelve confirmed infections and 335 clean systems.</p><p class="paragraph" style="text-align:left;"><b>This is security posture improvement in action</b>, each hunt makes your detection coverage broader and your blind spots smaller.</p><h2 class="heading" style="text-align:left;" id="the-cultural-transformation"><b>The Cultural Transformation</b></h2><p class="paragraph" style="text-align:left;">Solving the right side requires a fundamental shift in how SOC teams think about their work.</p><p class="paragraph" style="text-align:left;">Most SOCs operate with a <b>reactive mindset</b>: Alerts come in, you respond. Success = how fast you clear the queue. You&#39;re constantly behind, always catching up.</p><p class="paragraph" style="text-align:left;">When you solve the right side with forensic automation, you can shift to a <b>proactive mindset</b>: You assume threats are already in your environment that your detections missed. Your job is to actively hunt for them. Success = how much you improve detection coverage and validated security controls.</p><p class="paragraph" style="text-align:left;">This shift doesn&#39;t happen automatically. It requires leadership commitment, restructuring how analyst time is allocated (dedicating 20-30% to hunting), changing what metrics you track, and training your team on hunting methodologies.</p><p class="paragraph" style="text-align:left;">But the organizations that make this shift? They&#39;re the ones who find supply chain attacks like Glassworm before they spread through the entire organization.</p><h2 class="heading" style="text-align:left;" id="the-practical-implementation-path"><b>The Practical Implementation Path</b></h2><h3 class="heading" style="text-align:left;" id="phase-1-build-the-forensic-automati"><b>Phase 1: Build the Forensic Automation Foundation</b></h3><p class="paragraph" style="text-align:left;">Everything depends on this. You need a system that can remotely collect comprehensive forensic evidence across all OS types, triggered automatically based on alert severity, preserving chain of custody properly.</p><p class="paragraph" style="text-align:left;">This doesn&#39;t mean ripping out your EDR. <b>Your EDR is still critical for real-time detection and response.</b> But you need a forensic layer that:</p><ul><li><p class="paragraph" style="text-align:left;">Collects deeper artifacts than typical EDR telemetry (disk forensics, memory dumps, full file system analysis)</p></li><li><p class="paragraph" style="text-align:left;">Covers systems beyond traditional endpoints (cloud instances, containers, systems without agents)</p></li><li><p class="paragraph" style="text-align:left;">Provides extended retention without the cost of expanding EDR storage</p></li><li><p class="paragraph" style="text-align:left;">Unifies investigation across all your security tools in one workspace</p></li><li><p class="paragraph" style="text-align:left;">Preserves evidence properly for legal and compliance needs</p></li></ul><p class="paragraph" style="text-align:left;">Tools like Binalyze are purpose-built for this problem. You&#39;re not replacing your SIEM or EDR, you&#39;re filling the gap between &quot;alert fired&quot; and &quot;comprehensive evidence collected for hunting and investigation.&quot;</p><h3 class="heading" style="text-align:left;" id="phase-2-free-up-analyst-time-for-hu"><b>Phase 2: Free Up Analyst Time for Hunting</b></h3><p class="paragraph" style="text-align:left;">Allocate dedicated hunting time (20-30% of each analyst&#39;s week). Make it protected time, not &quot;hunt when you have spare cycles.&quot; Define a hunting cadence, weekly TTP-based hunts, monthly purple team exercises, quarterly baseline deviation hunts.</p><h3 class="heading" style="text-align:left;" id="phase-3-close-the-feedback-loops"><b>Phase 3: Close the Feedback Loops</b></h3><p class="paragraph" style="text-align:left;">From hunting to detection engineering: What gaps exist? What new rules should be built? The Glassworm hunt should result in new detections for supply chain attacks.</p><p class="paragraph" style="text-align:left;">From response to AI improvement: Was the AI&#39;s verdict correct? Validate with forensic evidence.</p><p class="paragraph" style="text-align:left;">From forensics to threat intelligence: Share what you&#39;re actually seeing in the wild.</p><h2 class="heading" style="text-align:left;" id="the-bottom-line-beyond-faster-respo"><b>The Bottom Line: Beyond &quot;Faster Response&quot;</b></h2><p class="paragraph" style="text-align:left;"><b>The right side isn&#39;t just about responding faster to incidents. It&#39;s about fundamentally transforming how your SOC operates.</b></p><p class="paragraph" style="text-align:left;">When you solve the right side with forensic automation, the response becomes faster and the evidence is complete. <b>But those are just the table stakes.</b></p><p class="paragraph" style="text-align:left;">The real transformation is that proactive hunting becomes feasible. Your team can actually hunt for threats when intel drops, instead of hoping your detections catch it. Detection engineering gets continuous feedback. Your security posture improves measurably over time.</p><p class="paragraph" style="text-align:left;">Yes, your EDR gives you telemetry. Yes, you can do some hunting with it. But when you need to hunt across your entire infrastructure, endpoints, cloud, containers, systems without agents, and correlate findings without pivoting through five tools, that&#39;s where forensic automation makes the difference.</p><p class="paragraph" style="text-align:left;">This is the shift from a SOC that fights fires well to a security operation that prevents fires from starting. From reactive response to proactive defense. From hoping your detections work to validating they work and continuously improving them.</p><p class="paragraph" style="text-align:left;">We did great work solving the middle with AI triage. We&#39;re making real progress on the left with better detection engineering. But the right side is what unlocks the SOC everyone actually wants to work in, one that hunts threats proactively and improves security posture measurably.</p><p class="paragraph" style="text-align:left;"><b>Don&#39;t just close alerts faster. Build a SOC that actually gets ahead of threats.</b></p><p class="paragraph" style="text-align:left;">That&#39;s what the right side is really about.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h1 class="heading" style="text-align:left;">Vendor Spotlight: <span style="color:rgb(17, 85, 204);"><a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow">Binalyze</a></span></h1><p class="paragraph" style="text-align:left;"><br>I need to be transparent: <b>I&#39;ve lived this problem.</b></p><p class="paragraph" style="text-align:left;">During my eight years at Adobe doing incident response and forensics, investigations that should have taken days stretched into weeks. Sometimes months. We&#39;d manually SSH into systems, run duct-taped scripts, and pray the evidence we needed hadn&#39;t rotated out yet.</p><p class="paragraph" style="text-align:left;">We tried SOAR. We tried standardization. <b>We never really solved it.</b></p><p class="paragraph" style="text-align:left;">When I saw the<a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow"> Binalyze</a> demo recently, my first thought was: &quot;This is exactly what I wish we had back then.&quot;</p><h3 class="heading" style="text-align:left;"><b>What They Actually Solve</b></h3><p class="paragraph" style="text-align:left;">When your AI correctly identifies a True Positive, you still need to collect forensic evidence <b>before it&#39;s overwritten</b>. Binalyze built the infrastructure for that:</p><p class="paragraph" style="text-align:left;"><b>DRONE</b> - Lightweight agent that remotely collects comprehensive forensic evidence (memory dumps, disk artifacts, process history) across Windows, Linux, macOS, ChromeOS, and cloud environments. Evidence collected in minutes, not hours.</p><p class="paragraph" style="text-align:left;"><b>AIR</b> - Investigation orchestration platform that centralizes all forensic artifacts, provides timeline analysis, and integrates with your SIEM/SOAR/EDR to trigger automated collection.</p><h3 class="heading" style="text-align:left;"><b>Why It Matters</b></h3><p class="paragraph" style="text-align:left;">Here&#39;s what&#39;s interesting: while this blog focuses on the right-side bottleneck, Binalyze actually enhances investigation across multiple stages.</p><p class="paragraph" style="text-align:left;">During AI Triage (Middle): When your AI SOC analyst is investigating that lateral movement alert, instant access to forensic artifacts helps reach more accurate verdicts. Memory dumps and process trees can turn &quot;Inconclusive&quot; into confident &quot;True Positive&quot; or &quot;False Positive&quot; decisions.</p><p class="paragraph" style="text-align:left;">During Deep Investigation (Right): Remember my scenario? 4 hours from alert to containment with manual forensics vs. 11 minutes with automation? This is where Binalyze is purpose-built: getting comprehensive forensic evidence when a True Positive needs deep investigation and response.</p><p class="paragraph" style="text-align:left;">The platform works at both stages because the infrastructure is the same, automated, comprehensive forensic collection. Whether you&#39;re enhancing AI triage or doing full incident response, you need the same artifacts, just at different investigation depths.</p><p class="paragraph" style="text-align:left;"><b>Learn more:</b> <a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow">binalyze.com</a></p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=can-ai-drive-response"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=bc99c868-c2af-438c-80cf-2ed5ad595ccd&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>SOC Reality Check</title>
  <description>Why Detection Is Only Half the Battle</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0fb1b093-4f25-4903-a6b2-e2e393e93217/SecOps_new_problem.gif" length="425342" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/soc-reality-check</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/soc-reality-check</guid>
  <pubDate>Tue, 04 Nov 2025 14:29:07 +0000</pubDate>
  <atom:published>2025-11-04T14:29:07Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><hr class="content_break"><p class="paragraph" style="text-align:left;"><i>A two-part series on the new bottleneck emerging in AI-powered SOCs, and why solving investigation created a better problem to solve</i>.<br></p><p class="paragraph" style="text-align:left;">Let me start with some good news: <b>We&#39;re actually winning at AI-powered security operations.</b></p><p class="paragraph" style="text-align:left;">No, really. Hear me out.</p><p class="paragraph" style="text-align:left;">Over the last two years, AI has genuinely transformed the <b>middle of the IR cycle</b>, investigation and triage. Vendors build amazing AI SOC analysts that can handle the 5Ws (Who, What, When, Where, Why), enrich alerts with context, and reach accurate verdicts in seconds instead of hours.</p><p class="paragraph" style="text-align:left;"><b>The middle is getting solved.</b> AI can investigate alerts at scale, and it does it well (of course if you implement it right)</p><p class="paragraph" style="text-align:left;">And now? The industry is <b>shifting left</b>. We&#39;re seeing platforms tackle data pipelines, log normalization, and even detection engineering itself. AI is helping us build better detections, optimize coverage, and reduce false positives at the source.</p><p class="paragraph" style="text-align:left;">This is real progress. We should celebrate it.</p><p class="paragraph" style="text-align:left;">But here&#39;s what&#39;s happening as a result of this progress: we&#39;re moving the bottleneck.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#0f3c71;"><b>Binalyze</b></span></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><div class="image"><a class="image__link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" rel="noopener" target="_blank"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/256e743b-3459-42af-84a4-ebd7005ba91b/Binalyzelogo.png?t=1762201528"/></a></div></td><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td></tr></table></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:center;"><span style="color:rgb(33, 33, 33);font-family:Arial, Helvetica, sans-serif;font-size:1.5rem;"><b>Investigate cyber threats in minutes</b></span></p></div><p class="paragraph" style="text-align:center;"><span style="color:rgb(33, 33, 33);font-size:11pt;"><b>AI-powered speed. Human-driven insight.</b></span></p><p class="paragraph" style="text-align:center;"><span style="color:rgb(33, 33, 33);font-size:11pt;"><b>Binalyze AIR is the forensic investigation automation platform accelerating incident response with AI precision – fast. </b></span></p><p class="paragraph" style="text-align:center;"><span style="color:rgb(34, 34, 34);font-family:Arial, Helvetica, sans-serif;font-size:14.6667px;"><b>Learn more at - [</b></span><span style="color:rgb(34, 34, 34);font-family:Arial, Helvetica, sans-serif;font-size:14.6667px;"><a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow"><b>Link</b></a></span><span style="color:rgb(34, 34, 34);font-family:Arial, Helvetica, sans-serif;font-size:14.6667px;"><b>]</b></span></p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="what-changed-today"><b>The Problem We Created by Solving the Middle</b></h1><p class="paragraph" style="text-align:left;">When AI handles investigation and triage brilliantly, and when detection engineering improves to generate higher-fidelity alerts, you end up with a new challenge:</p><p class="paragraph" style="text-align:left;"><b>You now have more True Positives and Inconclusive alerts that require deep investigation and incident response.</b></p><p class="paragraph" style="text-align:left;">Let me break this down with a real example:</p><p class="paragraph" style="text-align:left;"><b>Before AI (the old bottleneck):</b></p><ul><li><p class="paragraph" style="text-align:left;">1,000 alerts per day</p></li><li><p class="paragraph" style="text-align:left;">Analysts can investigate maybe 50-100 per day</p></li><li><p class="paragraph" style="text-align:left;">900 alerts never get properly looked at</p></li><li><p class="paragraph" style="text-align:left;">Real threats hiding in the noise</p></li><li><p class="paragraph" style="text-align:left;"><b>Bottleneck: Can&#39;t investigate everything</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>After AI in the Middle (current state):</b></p><ul><li><p class="paragraph" style="text-align:left;">1,000 alerts per day</p></li><li><p class="paragraph" style="text-align:left;">AI investigates all 1,000</p></li><li><p class="paragraph" style="text-align:left;">AI closes 700 as benign false positives</p></li><li><p class="paragraph" style="text-align:left;">AI flags 200 as low-confidence, likely benign</p></li><li><p class="paragraph" style="text-align:left;"><b>AI escalates 100 as True Positive or Inconclusive</b></p></li><li><p class="paragraph" style="text-align:left;">Analysts now have 100 high-quality alerts that need deeper investigation</p></li><li><p class="paragraph" style="text-align:left;"><b>New bottleneck: Can&#39;t properly respond to everything</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>See what happened?</b> You went from &quot;drowning in alerts&quot; to &quot;drowning in incidents that need forensic investigation and response.&quot;</p><p class="paragraph" style="text-align:left;">This is actually a <b>better problem to have</b>, you&#39;re working on real threats now, not noise. But it&#39;s still a bottleneck.</p><hr class="content_break"><p class="paragraph" style="text-align:left;">Related to this blog, there isa podcast episode, check it out: </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/FDbR3yVuEPA" width="100%"></iframe><h2 class="heading" style="text-align:left;" id="but-heres-where-it-gets-interesting">But Here&#39;s Where It Gets Interesting</h2><p class="paragraph" style="text-align:left;">While the bottleneck has clearly shifted right, smart organizations are discovering that forensic automation platforms can actually enhance investigation at <i>every</i> stage, not just the deep forensic response. </p><p class="paragraph" style="text-align:left;">Even during AI triage, when your AI SOC analyst is determining whether that alert is a True Positive or False Positive, having instant access to forensic artifacts can dramatically improve verdict accuracy: </p><ul><li><p class="paragraph" style="text-align:left;">Memory analysis reveals the full process tree AI couldn&#39;t see from logs alone</p></li><li><p class="paragraph" style="text-align:left;">Disk artifacts show persistence mechanisms that log data missed</p></li><li><p class="paragraph" style="text-align:left;">Network connection history provides context that makes &quot;Inconclusive&quot; → &quot;True Positive&quot; </p></li></ul><p class="paragraph" style="text-align:left;">This means fewer alerts stuck in &quot;Inconclusive&quot; limbo and more confident verdicts earlier in the process. The forensic infrastructure you build for deep investigation also makes your AI triage more effective.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0fb1b093-4f25-4903-a6b2-e2e393e93217/SecOps_new_problem.gif?t=1761822817"/></div><h2 class="heading" style="text-align:left;" id="what-deep-investigation-and-respons"><b>What &quot;Deep Investigation and Response&quot; Actually Means</b></h2><p class="paragraph" style="text-align:left;">When your AI SOC analyst escalates a True Positive or marks something as Inconclusive, here&#39;s what actually needs to happen:</p><p class="paragraph" style="text-align:left;"><b>The AI hands you a verdict:</b></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">TRUE POSITIVE: Lateral movement detected</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">User: john.doe</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">Source: WORKSTATION-047  </span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">Target: DC-01 (admin share accessed)</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">Confidence: HIGH</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">MITRE: T1021, T1570</span></p><p class="paragraph" style="text-align:left;"><span style="font-family:Space Mono,Courier,'Lucida Console',Monaco,monospace;">Recommendation: Immediate forensic investigation and containment</span></p><p class="paragraph" style="text-align:left;"><b>Great! Now what?</b></p><p class="paragraph" style="text-align:left;">Your analyst (or IR team) needs to:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Collect forensic evidence</b> from affected systems<br></p><ul><li><p class="paragraph" style="text-align:left;">Memory dumps before artifacts are overwritten</p></li><li><p class="paragraph" style="text-align:left;">Disk analysis for persistence mechanisms</p></li><li><p class="paragraph" style="text-align:left;">Process execution history</p></li><li><p class="paragraph" style="text-align:left;">Network connections and data transfers</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Determine blast radius</b></p><ul><li><p class="paragraph" style="text-align:left;">What other systems did this user access?</p></li><li><p class="paragraph" style="text-align:left;">Are there signs of lateral movement elsewhere?</p></li><li><p class="paragraph" style="text-align:left;">What data might have been accessed or exfiltrated?</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Preserve evidence</b> for potential legal/compliance needs</p><ul><li><p class="paragraph" style="text-align:left;">Chain of custody documentation</p></li><li><p class="paragraph" style="text-align:left;">Timeline reconstruction</p></li><li><p class="paragraph" style="text-align:left;">All artifacts properly stored and indexed</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Execute containment</b> according to your IR playbook</p><ul><li><p class="paragraph" style="text-align:left;">Isolate affected endpoints</p></li><li><p class="paragraph" style="text-align:left;">Disable compromised accounts</p></li><li><p class="paragraph" style="text-align:left;">Block malicious IPs/domains</p></li><li><p class="paragraph" style="text-align:left;">(All with proper approvals and governance)</p></li></ul></li><li><p class="paragraph" style="text-align:left;"><b>Coordinate with stakeholders</b></p><ul><li><p class="paragraph" style="text-align:left;">IT for system access and changes</p></li><li><p class="paragraph" style="text-align:left;">Legal for compliance and evidence handling</p></li><li><p class="paragraph" style="text-align:left;">Management for business impact decisions</p></li><li><p class="paragraph" style="text-align:left;">External parties if breach notification required</p></li></ul></li></ol><p class="paragraph" style="text-align:left;"><b>And here&#39;s the kicker: most of this is still manual, slow, and inconsistent.</b></p><h2 class="heading" style="text-align:left;" id="why-the-right-side-became-the-new-b"><b>Why the Right Side Became the New Bottleneck</b></h2><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f43a7198-83e5-4789-9702-0e856775e16e/Beyond_SOC_TRIAGE.gif?t=1761827322"/></div><p class="paragraph" style="text-align:left;">As you solve the middle (investigation/triage) and improve the left (detection engineering), you&#39;re naturally generating more high-quality incidents that require the right side of the IR cycle to work properly:</p><p class="paragraph" style="text-align:left;"><b>Investigation → Containment → Eradication → Recovery → Lessons Learned</b></p><p class="paragraph" style="text-align:left;">But the right side hasn&#39;t kept pace with the middle and left. Here&#39;s what&#39;s still broken:</p><h3 class="heading" style="text-align:left;" id="1-forensic-evidence-collection-is-m"><b>1. Forensic Evidence Collection is Manual and Slow</b></h3><p class="paragraph" style="text-align:left;"><b>What actually happens:</b></p><ul><li><p class="paragraph" style="text-align:left;">Analyst gets Alerts that requires further investigation at 10:00 AM</p></li><li><p class="paragraph" style="text-align:left;">Starts trying to collect forensic evidence at 10:15 AM</p></li><li><p class="paragraph" style="text-align:left;">Realizes they need to SSH into multiple systems(or use your EDR)</p></li><li><p class="paragraph" style="text-align:left;">Discovers some logs have already rotated out (oops)</p></li><li><p class="paragraph" style="text-align:left;">Manually pulls what&#39;s available from EDR (if the agent is installed)</p></li><li><p class="paragraph" style="text-align:left;">Tries to get memory dumps (complicated, requires specific tools and permissions)</p></li><li><p class="paragraph" style="text-align:left;"><b>By 2:00 PM, maybe has incomplete forensic evidence</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>The problem:</b></p><ul><li><p class="paragraph" style="text-align:left;">Evidence gets overwritten or rotated before you can collect it</p></li><li><p class="paragraph" style="text-align:left;">Collection process is different for every analyst (&quot;tribal knowledge&quot;)</p></li><li><p class="paragraph" style="text-align:left;">Manual processes don&#39;t scale when you have 20 incidents per day instead of 5</p></li></ul><h3 class="heading" style="text-align:left;" id="2-ir-playbooks-arent-executable"><b>2. IR Playbooks Aren&#39;t Executable</b></h3><p class="paragraph" style="text-align:left;">Remember my blog series on playbooks? Most IR playbooks are PDFs or wiki pages that say things like:</p><p class="paragraph" style="text-align:left;">Lateral Movement Response:</p><p class="paragraph" style="text-align:left;">1. Isolate affected systems</p><p class="paragraph" style="text-align:left;">2. Collect forensic evidence</p><p class="paragraph" style="text-align:left;">3. Determine scope of compromise</p><p class="paragraph" style="text-align:left;">4. Reset credentials</p><p class="paragraph" style="text-align:left;">5. Document findings</p><p class="paragraph" style="text-align:left;"><b>This is guidance for humans, not executable automation.</b></p><p class="paragraph" style="text-align:left;">When your AI SOC solution escalates 20 True Positives per day, you can&#39;t manually execute these steps 20 times. You need:</p><ul><li><p class="paragraph" style="text-align:left;">Automated forensic collection triggered by alert severity</p></li><li><p class="paragraph" style="text-align:left;">Standardized evidence preservation</p></li><li><p class="paragraph" style="text-align:left;">Orchestrated response actions with proper governance</p></li><li><p class="paragraph" style="text-align:left;">Consistent execution regardless of who&#39;s on shift</p></li></ul><h3 class="heading" style="text-align:left;" id="3-response-actions-require-too-much"><b>3. Response Actions Require Too Much Coordination</b></h3><p class="paragraph" style="text-align:left;">Even when you know what needs to be done, executing it requires:</p><ul><li><p class="paragraph" style="text-align:left;">Multiple approval chains (IT, Security, Management)</p></li><li><p class="paragraph" style="text-align:left;">Coordination across teams (Security, IT, DevOps)</p></li><li><p class="paragraph" style="text-align:left;">Navigating change management processes</p></li><li><p class="paragraph" style="text-align:left;">Fear of business disruption from containment actions</p></li></ul><p class="paragraph" style="text-align:left;">So containment that should happen in minutes takes hours or days because you&#39;re stuck in Slack threads and email chains getting approvals.</p><h2 class="heading" style="text-align:left;" id="the-shift-map-where-we-are-and-wher"><b>The Shift Map: Where We Are and Where We&#39;re Going</b></h2><p class="paragraph" style="text-align:left;">Let me map this against the SecOps AI Shift Map I introduced in my previous blog:</p><p class="paragraph" style="text-align:left;"><b>Left Side (Detection & Data):</b></p><ul><li><p class="paragraph" style="text-align:left;">✅ AI is starting to help here</p></li><li><p class="paragraph" style="text-align:left;">✅ Better detection engineering with AI assistance</p></li><li><p class="paragraph" style="text-align:left;">✅ Improved data pipelines and normalization</p></li><li><p class="paragraph" style="text-align:left;"><b>Status: Progress being made</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>Middle (Investigation & Triage):</b></p><ul><li><p class="paragraph" style="text-align:left;">✅ AI SOC analysts handle this brilliantly</p></li><li><p class="paragraph" style="text-align:left;">✅ Enrichment, 5Ws, verdict reached in seconds</p></li><li><p class="paragraph" style="text-align:left;">✅ False positives filtered out effectively</p></li><li><p class="paragraph" style="text-align:left;"><b>Status: Progress being made</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>Right Side (Response & Recovery):</b></p><ul><li><p class="paragraph" style="text-align:left;">❌ Forensic evidence collection still manual</p></li><li><p class="paragraph" style="text-align:left;">❌ IR playbooks not machine-executable</p></li><li><p class="paragraph" style="text-align:left;">❌ Response actions require too much human coordination</p></li><li><p class="paragraph" style="text-align:left;">❌ Recovery and lessons learned feedback loops broken</p></li><li><p class="paragraph" style="text-align:left;"><b>Status: This is the new bottleneck</b></p></li></ul><h2 class="heading" style="text-align:left;" id="why-this-matters-the-investigation-"><b>Why This Matters: The Investigation Debt Problem</b></h2><p class="paragraph" style="text-align:left;">Here&#39;s a concept I don&#39;t hear talked about enough: <b>Investigation Debt</b>.</p><p class="paragraph" style="text-align:left;">Investigation Debt is what accumulates when you have True Positives or Inconclusive alerts that you can&#39;t properly investigate with complete forensic evidence.</p><p class="paragraph" style="text-align:left;">Every time you:</p><ul><li><p class="paragraph" style="text-align:left;">Close a True Positive without collecting full forensic artifacts</p></li><li><p class="paragraph" style="text-align:left;">Skip deeper analysis because evidence collection is too manual</p></li><li><p class="paragraph" style="text-align:left;">Move on because &quot;we don&#39;t have time to do full forensics on everything&quot;</p></li><li><p class="paragraph" style="text-align:left;">Accept &quot;the logs rotated out&quot; as an answer</p></li></ul><p class="paragraph" style="text-align:left;"><b>You&#39;re accumulating Investigation Debt.</b></p><p class="paragraph" style="text-align:left;">And here&#39;s what makes this dangerous: <b>that lateral movement alert you couldn&#39;t fully investigate three months ago might have been your initial compromise.</b> But you didn&#39;t collect the forensic evidence, logs rotated, the attacker cleaned up, and now you&#39;re doing incident response in the dark.</p><p class="paragraph" style="text-align:left;">The irony is that <b>better AI in the middle makes Investigation Debt more visible.</b></p><p class="paragraph" style="text-align:left;">Before AI, you had so much noise you didn&#39;t even know which alerts were real. Now AI is flagging possible True Positives for you, and you&#39;re realizing: <b>&quot;We don&#39;t have the capacity to properly respond to all of these.&quot;</b></p><h2 class="heading" style="text-align:left;" id="what-solving-the-right-side-actuall"><b>What &quot;Solving the Right Side&quot; Actually Requires</b></h2><p class="paragraph" style="text-align:left;">So what does the right side need to keep pace with the middle and left?</p><h3 class="heading" style="text-align:left;" id="1-automated-forensic-evidence-colle"><b>1. Automated Forensic Evidence Collection</b></h3><p class="paragraph" style="text-align:left;">When a True Positive alert fires, evidence collection should happen <b>automatically</b>, not manually:</p><ul><li><p class="paragraph" style="text-align:left;">Memory dumps captured before artifacts are overwritten</p></li><li><p class="paragraph" style="text-align:left;">Disk forensics collected immediately</p></li><li><p class="paragraph" style="text-align:left;">Process trees and network connections preserved</p></li><li><p class="paragraph" style="text-align:left;">All artifacts time-stamped and stored with proper chain of custody</p></li></ul><p class="paragraph" style="text-align:left;"><b>This needs to be triggered by alert severity, not analyst memory.</b></p><h3 class="heading" style="text-align:left;" id="2-response-orchestration-with-gover"><b>2. Response Orchestration with Governance</b></h3><p class="paragraph" style="text-align:left;">Response actions need to be automated but with proper safety rails:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Approval workflows</b> for high-impact actions</p></li><li><p class="paragraph" style="text-align:left;"><b>Blast radius checks</b> (don&#39;t isolate 500 endpoints because one script failed)</p></li><li><p class="paragraph" style="text-align:left;"><b>Rollback procedures</b> if containment causes problems</p></li><li><p class="paragraph" style="text-align:left;"><b>Audit trails</b> of who approved what and when</p></li></ul><p class="paragraph" style="text-align:left;">This is where SOAR was supposed to help, but as I wrote in my Shift Map blog: <b>we failed at SOAR not because the tech was bad, but because our processes were a mess.</b></p><h2 class="heading" style="text-align:left;" id="the-path-forward-shift-right"><b>The Path Forward: Shift Right</b></h2><p class="paragraph" style="text-align:left;">Here&#39;s where we are:</p><p class="paragraph" style="text-align:left;">✅<b> Middle is getting solved</b> - AI handles investigation and triage brilliantly</p><p class="paragraph" style="text-align:left;">🔄<b> Left is improving</b> - Detection engineering and data pipelines are getting AI assistance</p><p class="paragraph" style="text-align:left;">❌<b> Right is the bottleneck</b> - Forensic collection, response execution, and recovery are still manual</p><p class="paragraph" style="text-align:left;">The solution isn&#39;t to slow down the middle or left. The solution is to <b>build the right side infrastructure to match.</b></p><p class="paragraph" style="text-align:left;">That means:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Forensic automation platforms</b> that collect evidence at machine speed</p></li><li><p class="paragraph" style="text-align:left;"><b>Machine-executable IR playbooks</b> that respond consistently</p></li><li><p class="paragraph" style="text-align:left;"><b>Response orchestration</b> with appropriate governance and safety rails</p></li><li><p class="paragraph" style="text-align:left;"><b>Feedback loops</b> that actually work (lessons learned → detection engineering)</p></li></ul><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h1 class="heading" style="text-align:left;">Vendor Spotlight: <span style="color:rgb(17, 85, 204);"><a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow">Binalyze</a></span></h1><p class="paragraph" style="text-align:left;"><br>I need to be transparent: <b>I&#39;ve lived this problem.</b></p><p class="paragraph" style="text-align:left;">During my eight years at Adobe doing incident response and forensics, investigations that should have taken days stretched into weeks. Sometimes months. We&#39;d manually SSH into systems, run duct-taped scripts, and pray the evidence we needed hadn&#39;t rotated out yet.</p><p class="paragraph" style="text-align:left;">We tried SOAR. We tried standardization. <b>We never really solved it.</b></p><p class="paragraph" style="text-align:left;">When I saw the<a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow"> Binalyze</a> demo recently, my first thought was: &quot;This is exactly what I wish we had back then.&quot;</p><h3 class="heading" style="text-align:left;"><b>What They Actually Solve</b></h3><p class="paragraph" style="text-align:left;">When your AI correctly identifies a True Positive, you still need to collect forensic evidence <b>before it&#39;s overwritten</b>. Binalyze built the infrastructure for that:</p><p class="paragraph" style="text-align:left;"><b>DRONE</b> - Lightweight agent that remotely collects comprehensive forensic evidence (memory dumps, disk artifacts, process history) across Windows, Linux, macOS, ChromeOS, and cloud environments. Evidence collected in minutes, not hours.</p><p class="paragraph" style="text-align:left;"><b>AIR</b> - Investigation orchestration platform that centralizes all forensic artifacts, provides timeline analysis, and integrates with your SIEM/SOAR/EDR to trigger automated collection.</p><h3 class="heading" style="text-align:left;"><b>Why It Matters</b></h3><p class="paragraph" style="text-align:left;">Here&#39;s what&#39;s interesting: while this blog focuses on the right-side bottleneck, Binalyze actually enhances investigation across multiple stages.</p><p class="paragraph" style="text-align:left;">During AI Triage (Middle): When your AI SOC analyst is investigating that lateral movement alert, instant access to forensic artifacts helps reach more accurate verdicts. Memory dumps and process trees can turn &quot;Inconclusive&quot; into confident &quot;True Positive&quot; or &quot;False Positive&quot; decisions.</p><p class="paragraph" style="text-align:left;">During Deep Investigation (Right): Remember my scenario? 4 hours from alert to containment with manual forensics vs. 11 minutes with automation? This is where Binalyze is purpose-built: getting comprehensive forensic evidence when a True Positive needs deep investigation and response.</p><p class="paragraph" style="text-align:left;">The platform works at both stages because the infrastructure is the same, automated, comprehensive forensic collection. Whether you&#39;re enhancing AI triage or doing full incident response, you need the same artifacts, just at different investigation depths.</p><p class="paragraph" style="text-align:left;"><b>Learn more:</b> <a class="link" href="https://www.binalyze.com/air?utm_campaign=23904562-Global-PR-Influencer&utm_source=InfluencerFilip" target="_blank" rel="noopener noreferrer nofollow">binalyze.com</a></p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=soc-reality-check"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=6ee197bc-bf84-413d-a9a0-d56b75fb56a6&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>From PDF Playbooks to Machine-Executable Logic </title>
  <description>Explore the evolution from static PDF playbooks to machine-executable logic, revolutionizing security automation and transforming how SOC teams handle detection workflows.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c991c10d-b867-4c2e-ae29-155a7e441b8c/PDF_playbooks_to_AI_.png" length="1827590" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/from-pdf-playbooks-to-machine-executable-logic</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/from-pdf-playbooks-to-machine-executable-logic</guid>
  <pubDate>Wed, 22 Oct 2025 12:35:12 +0000</pubDate>
  <atom:published>2025-10-22T12:35:12Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><h1 class="heading" style="text-align:left;" id="a-quick-note-before-we-start"><b>A Quick Note Before We Start</b></h1><p class="paragraph" style="text-align:left;">When I wrote about how AI transforms detection engineering from narrow precision to broad coverage, I originally planned this as Part 2 of that series. The logic made sense: <a class="link" href="https://www.cybersec-automation.com/p/how-ai-transforms-detection-engineering?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=from-pdf-playbooks-to-machine-executable-logic" target="_blank" rel="noopener noreferrer nofollow">Part 1</a> shows how AI enables comprehensive detections, Part 2 would explain how to handle the resulting alert volume.</p><p class="paragraph" style="text-align:left;">But as I started writing, I realized this piece actually belongs with a different blog I published a couple months ago: <b>&quot;</b><a class="link" href="https://www.cybersec-automation.com/p/why-soc-analysts-ignore-your-playbooks-72e6ec0f57d03b15?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=from-pdf-playbooks-to-machine-executable-logic" target="_blank" rel="noopener noreferrer nofollow">Why SOC Analysts Ignore Your Playbooks</a><b>&quot;</b>.</p><p class="paragraph" style="text-align:left;">Here&#39;s why: The detection engineering blog is about <b>what you can now detect</b>. This blog is about <b>how you investigate what you detect</b>. And the investigation problem traces back to the same root causes I identified in the playbooks blog: broken processes, ignored documentation, and tribal knowledge that walks out the door when your best analysts leave.</p><p class="paragraph" style="text-align:left;">So consider this <b>Part 2 of the playbooks series</b>, not the detection engineering one. Though honestly, they&#39;re all connected; you can&#39;t deploy comprehensive detections without machine-executable investigation procedures, and you can&#39;t build those procedures if your playbooks are PDF documents nobody follows.</p><p class="paragraph" style="text-align:left;">If you haven&#39;t read Part 1 yet, start there. It explains why playbooks are broken and how to fix them by coupling them with detections. This post takes that foundation and shows you how to transform those playbooks into logic that AI can actually execute.</p><p class="paragraph" style="text-align:left;">Let&#39;s dive in.</p><h2 class="heading" style="text-align:left;" id="the-problem-we-thought-we-solved"><b>The Problem We Thought We Solved</b></h2><p class="paragraph" style="text-align:left;">In Part 1, I argued that the biggest mistake in SecOps is shipping detections without playbooks. That shadow detection sitting in your SIEM that nobody understands? That&#39;s the root cause of your broken feedback loop, your alert fatigue, and your analyst burnout.</p><p class="paragraph" style="text-align:left;">The fix seemed straightforward:</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Build the playbook when you build the detection</p></li><li><p class="paragraph" style="text-align:left;">Use GenAI to draft it in seconds</p></li><li><p class="paragraph" style="text-align:left;">Automate the steps you can</p></li><li><p class="paragraph" style="text-align:left;">Let AI learn from analyst behavior for the rest</p></li></ol><p class="paragraph" style="text-align:left;">And for <b>human analysts</b>, this works. You now have documented procedures, analysts can follow them (or at least reference them when needed), and new joiners can learn how your organization operates.</p><p class="paragraph" style="text-align:left;">But then you try to hand these playbooks to an AI agent to execute autonomously.</p><p class="paragraph" style="text-align:left;">And it all falls apart.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#6300ff;"><b>Prophet Security</b></span></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><div class="image"><a class="image__link" href="https://hubs.ly/Q03Pqlnt0?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=from-pdf-playbooks-to-machine-executable-logic" rel="noopener" target="_blank"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e019a385-22c7-4e0c-b6d4-d1785143b449/prophet.png?t=1761050800"/></a></div></td><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td></tr></table></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:center;"><span style="color:rgb(27, 28, 29);"><b>Put every alert through a complete investigation.</b></span></p></div><p class="paragraph" style="text-align:center;"><span style="color:rgb(27, 28, 29);">Prophet AI pulls the right context, follows a reproducible line of questioning, and returns a clear determination with linked evidence and an audit trail. Analysts stay in control while investigations finish faster and hold up under review. </span></p><p class="paragraph" style="text-align:center;"><span style="color:rgb(27, 28, 29);">See it on your data. Request a demo at </span><a class="link" href="https://hubs.ly/Q03Pqlnt0?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=from-pdf-playbooks-to-machine-executable-logic" target="_blank" rel="noopener noreferrer nofollow">prophetsecurity.ai</a></p></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="why-your-fixed-playbooks-still-brea"><b>Why Your &quot;Fixed&quot; Playbooks Still Break AI</b></h2><p class="paragraph" style="text-align:left;">Let&#39;s take a typical playbook that follows my advice from Part 1. It&#39;s not a dusty PDF,it&#39;s embedded with the detection, it&#39;s maintained, and it actually reflects how your team works:</p><p class="paragraph" style="text-align:left;"><b>Suspicious Login Investigation Procedure</b></p><p class="paragraph" style="text-align:left;"><i>When you receive a suspicious login alert, follow these steps:</i></p><ol start="1"><li><p class="paragraph" style="text-align:left;">Check whether the login location matches the user&#39;s typical locations</p></li><li><p class="paragraph" style="text-align:left;">Review their login history for the past 30 days in your identity provider</p></li><li><p class="paragraph" style="text-align:left;">If the location is unusual, verify whether the user recently traveled</p></li><li><p class="paragraph" style="text-align:left;">Check if the device fingerprint is recognized</p></li><li><p class="paragraph" style="text-align:left;">If multiple red flags exist, contact the user&#39;s manager</p></li><li><p class="paragraph" style="text-align:left;">If you cannot confirm legitimacy within 2 hours, force password reset</p></li></ol><p class="paragraph" style="text-align:left;">This is a GOOD playbook by Part 1 standards. It&#39;s clear, actionable, tied to a specific detection. An experienced analyst knows exactly what to do.</p><p class="paragraph" style="text-align:left;">But hand this to an AI agent, and watch what happens:</p><p class="paragraph" style="text-align:left;"><b>What exactly is an &quot;unusual location&quot;?</b></p><ul><li><p class="paragraph" style="text-align:left;">50km away? 500km? Different country? Different continent?</p></li><li><p class="paragraph" style="text-align:left;">What if the user works remotely and travels frequently?</p></li><li><p class="paragraph" style="text-align:left;">What if they&#39;re using a VPN that makes location data unreliable?</p></li></ul><p class="paragraph" style="text-align:left;"><b>What constitutes &quot;multiple red flags&quot;?</b></p><ul><li><p class="paragraph" style="text-align:left;">Two flags? Three? Which combinations matter more?</p></li><li><p class="paragraph" style="text-align:left;">Is unusual location + recognized device better or worse than normal location + unrecognized device?</p></li><li><p class="paragraph" style="text-align:left;">How do you weight these factors?</p></li></ul><p class="paragraph" style="text-align:left;"><b>What if your identity provider is temporarily unavailable?</b></p><ul><li><p class="paragraph" style="text-align:left;">Does the AI wait? For how long?</p></li><li><p class="paragraph" style="text-align:left;">Does it proceed without that data? How does that affect its confidence?</p></li><li><p class="paragraph" style="text-align:left;">Does it automatically escalate?</p></li></ul><p class="paragraph" style="text-align:left;"><b>When should AI act autonomously vs. escalate to a human?</b></p><ul><li><p class="paragraph" style="text-align:left;">Can it force a password reset on its own? For which user types?</p></li><li><p class="paragraph" style="text-align:left;">What if the &quot;suspicious&quot; login is the CEO accessing email at 2 AM?</p></li></ul><p class="paragraph" style="text-align:left;">Human analysts handle this ambiguity through experience, context, and judgment. They know that &quot;unusual&quot; for the CEO is different than &quot;unusual&quot; for a contractor. They know which data sources to trust. They adapt when systems are down.</p><p class="paragraph" style="text-align:left;"><b>AI doesn&#39;t have that context unless you give it explicitly.</b></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b205f8ce-65e2-4942-8881-f6694f334650/PDF_Playbooks_to_AI_SOC.gif?t=1761051278"/></div><h2 class="heading" style="text-align:left;" id="the-missing-layer-machine-executabl"><b>The Missing Layer: Machine-Executable Logic</b></h2><p class="paragraph" style="text-align:left;">This is what I&#39;ve realized since Part 1: there&#39;s a gap between <i>what humans need</i> and <i>what AI needs</i>.</p><p class="paragraph" style="text-align:left;"><b>Humans need:</b></p><ul><li><p class="paragraph" style="text-align:left;">Clear guidance on what to investigate</p></li><li><p class="paragraph" style="text-align:left;">Reference points for common scenarios</p></li><li><p class="paragraph" style="text-align:left;">Flexibility to adapt based on context</p></li><li><p class="paragraph" style="text-align:left;"><b>Your Part 1 playbooks solve this</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>AI needs:</b></p><ul><li><p class="paragraph" style="text-align:left;">Explicit decision logic with no ambiguity</p></li><li><p class="paragraph" style="text-align:left;">Quantifiable thresholds and confidence scores</p></li><li><p class="paragraph" style="text-align:left;">Complete coverage of edge cases and fallbacks</p></li><li><p class="paragraph" style="text-align:left;">Structured entity resolution across data sources</p></li><li><p class="paragraph" style="text-align:left;"><b>Your Part 1 playbooks don&#39;t solve this</b></p></li></ul><p class="paragraph" style="text-align:left;">So we need a new layer. Not to replace human-readable playbooks, but to sit underneath them.</p><p class="paragraph" style="text-align:left;">Let me show you what this looks like.</p><h2 class="heading" style="text-align:left;" id="the-same-playbook-but-machine-execu"><b>The Same Playbook, But Machine-Executable</b></h2><p class="paragraph" style="text-align:left;">Here&#39;s how that suspicious login investigation transforms when designed for AI execution:</p><div class="codeblock"><pre><code>yaml
playbook: suspicious_login_investigation
version: 2.3
owner: identity_security_team

# Data source requirements with structured fallbacks
required_data_sources:
  okta_logs:
    retention_days: 30
    required_fields: [user_id, src_ip, location, device_fingerprint, mfa_status]
    unavailable_action:
      type: cap_max_confidence
      max_confidence: 0.80
  
  vpn_logs:
    retention_days: 7
    unavailable_action:
      type: confidence_penalty
      delta: 0.10

# Entity resolution: how to connect data across systems
entity_resolution:
  user_identity:
    canonical_identifier: email
  
  crowdstrike_endpoint:
    steps:
      - &#123;action: map, from: alert.email, to: active_directory.userPrincipalName&#125;
      - &#123;action: get, field: active_directory.lastLogonComputer&#125;
      - &#123;action: map, from: active_directory.lastLogonComputer, to: crowdstrike.hostname&#125;
      - &#123;action: get, field: crowdstrike.AID&#125;
    fallback: &#123;strategy: use_cache, max_age_hours: 24&#125;

# Confidence scoring: weights sum to 1.0
confidence_scoring:
  method: weighted_sum
  normalize_weights: true
  
  factors:
    - name: location_deviation
      weight: 0.30
      scoring:
        - &#123;when: &quot;distance_km &lt; 50 AND time_plausible&quot;, score: 0.80&#125;
        - &#123;when: &quot;distance_km &gt;= 500 OR impossible_travel&quot;, score: 0.20&#125;
    
    - name: mfa_status
      weight: 0.25
    
    - name: device_recognition
      weight: 0.25
    
    - name: time_of_day_anomaly
      weight: 0.15
    
    - name: concurrent_activity
      weight: 0.05

# Complete decision ranges (no gaps: 0.0-1.0 covered)
decision_thresholds:
  auto_close_benign: &#123;range: [0.95, 1.00], action: close_with_docs&#125;
  auto_close_fp: &#123;range: [0.90, 0.95], action: close_and_tune_detection&#125;
  low_risk_action: &#123;range: [0.75, 0.90], action: require_mfa_reauth&#125;
  escalate_medium: &#123;range: [0.60, 0.75], action: analyst_review, sla_hours: 4&#125;
  escalate_high: &#123;range: [0.40, 0.60], action: analyst_review, sla_hours: 2&#125;
  escalate_critical: &#123;range: [0.00, 0.40], action: incident_response, sla_minutes: 30&#125;

# Safety rails for autonomous actions
governance:
  suspend_account:
    approval_required: true
    two_person_rule: true
    blast_radius_check: true
  
  isolate_endpoint:
    approval_required: true
    blast_radius_limit: 5

# Audit with privacy controls
audit_trail:
  capture: [data_sources_queried, confidence_scores, reasoning_chain, action_taken]
  privacy: &#123;redact_pii: true, respect_residency: true&#125;
```</code></pre></div><h2 class="heading" style="text-align:left;" id="see-the-difference"><b>See the difference?</b></h2><p class="paragraph" style="text-align:left;"><b>No ambiguity.</b> &quot;Unusual location&quot; becomes <span style="color:rgb(24, 128, 56);">distance_km &gt;= 500 OR impossible_travel</span> with a confidence score of 0.20.</p><p class="paragraph" style="text-align:left;"><b>No gaps.</b> Every possible confidence score from 0.0 to 1.0 maps to a specific action.</p><p class="paragraph" style="text-align:left;"><b>Explicit fallbacks.</b> If Okta is down, max confidence caps at 0.80. If VPN logs are unavailable, confidence drops by 0.10.</p><p class="paragraph" style="text-align:left;"><b>Measurable weights.</b> Location deviation is weighted 0.30, MFA status 0.25, device recognition 0.25,you can validate these against historical outcomes.</p><p class="paragraph" style="text-align:left;"><b>Clear governance.</b> AI can suggest account suspension, but requires human approval with two-person rule.</p><p class="paragraph" style="text-align:left;">This isn&#39;t documentation for humans to read. <b>It&#39;s executable logic for AI to run.</b></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/036c7de5-0056-4dc1-8832-e6a319ba2286/AI_SOC_comparison.gif?t=1760456583"/></div><h2 class="heading" style="text-align:left;" id="connecting-back-to-part-1-the-full-"><b>Connecting Back to Part 1: The Full Picture</b></h2><p class="paragraph" style="text-align:left;">Remember in Part 1 when I talked about two approaches to fixing playbooks?</p><ul><li><p class="paragraph" style="text-align:left;"><b>Approach 1:</b> Build playbooks during detection engineering</p></li><li><p class="paragraph" style="text-align:left;"><b>Approach 2:</b> Let AI observe analysts and generate playbooks from behavior</p></li></ul><p class="paragraph" style="text-align:left;">Both of these still apply. But now I&#39;m adding a critical step:</p><h3 class="heading" style="text-align:left;" id="approach-1-extended-detection-engin"><b>Approach 1 Extended: Detection Engineering → Machine Logic</b></h3><ol start="1"><li><p class="paragraph" style="text-align:left;">Build human-readable playbook with detection (Part 1)</p></li><li><p class="paragraph" style="text-align:left;">Identify which steps can be automated</p></li><li><p class="paragraph" style="text-align:left;"><b>Transform those steps into machine-executable logic</b> (Part 2)</p></li></ol><h3 class="heading" style="text-align:left;" id="approach-2-extended-behavioral-lear"><b>Approach 2 Extended: Behavioral Learning → Quantified Rules</b></h3><ol start="1"><li><p class="paragraph" style="text-align:left;">Let AI observe how analysts investigate alerts (Part 1)</p></li><li><p class="paragraph" style="text-align:left;">Generate initial playbook from behavior patterns</p></li><li><p class="paragraph" style="text-align:left;"><b>Codify the decision logic into structured, quantifiable rules</b> (Part 2)</p></li></ol><p class="paragraph" style="text-align:left;"><b>The insight from Part 1 still holds:</b> analysts going by &quot;instinct&quot; have built better processes in their heads.</p><p class="paragraph" style="text-align:left;"><b>The challenge in Part 2 is:</b> how do we capture that instinct as explicit, measurable logic that AI can execute?</p><p class="paragraph" style="text-align:left;">This is where those analysts who ignore playbooks actually become your most valuable asset. Watch how they handle edge cases. Ask them why they made each decision. What data points did they weigh most heavily? When did they escalate vs. auto-close?</p><p class="paragraph" style="text-align:left;"><b>That tribal knowledge you were trying to capture in Part 1? Now you&#39;re quantifying it for Part 2.</b></p><h2 class="heading" style="text-align:left;" id="what-this-enables-beyond-just-autom"><b>What This Enables (Beyond Just Automation)</b></h2><p class="paragraph" style="text-align:left;">When I published Part 1, the focus was on fixing broken processes. If playbooks are ignored, your feedback loop breaks, your detection tuning stops, and analyst burnout accelerates.</p><p class="paragraph" style="text-align:left;">But machine-executable playbooks unlock something bigger: <b>measurable, improvable AI decision-making</b>.</p><p class="paragraph" style="text-align:left;">In Part 1, I mentioned the vanity metrics problem, everyone obsesses over alert closure times, but nobody tracks whether AI is making <i>correct</i> decisions.</p><p class="paragraph" style="text-align:left;">Machine-executable playbooks make real metrics possible:</p><h3 class="heading" style="text-align:left;" id="ai-decision-accuracy"><b>AI Decision Accuracy</b></h3><ul><li><p class="paragraph" style="text-align:left;">Of benign closures, how many were actually benign?</p></li><li><p class="paragraph" style="text-align:left;">When AI says 95% confident, is it right 95% of the time?</p></li><li><p class="paragraph" style="text-align:left;">Which alert types show the most false positives from AI triage?</p></li></ul><h3 class="heading" style="text-align:left;" id="learning-over-time"><b>Learning Over Time</b></h3><ul><li><p class="paragraph" style="text-align:left;">Does accuracy improve week over week?</p></li><li><p class="paragraph" style="text-align:left;">Do analyst overrides result in playbook improvements?</p></li><li><p class="paragraph" style="text-align:left;">Is the system getting better at handling your specific environment?</p></li></ul><h3 class="heading" style="text-align:left;" id="drift-detection"><b>Drift Detection</b></h3><ul><li><p class="paragraph" style="text-align:left;">Is AI accuracy degrading as your environment changes?</p></li><li><p class="paragraph" style="text-align:left;">Which confidence factors show the most drift?</p></li><li><p class="paragraph" style="text-align:left;">Are updates keeping pace with infrastructure changes?</p></li></ul><p class="paragraph" style="text-align:left;">You can&#39;t measure any of this with ambiguous playbooks that analysts interpret differently on every shift. But with explicit, structured logic? You can track every decision, validate every confidence score, and continuously improve.</p><p class="paragraph" style="text-align:left;"><b>This is the feedback loop Part 1 was trying to fix, now operating at AI speed.</b></p><h2 class="heading" style="text-align:left;" id="the-six-requirements-for-machine-ex"><b>The Six Requirements for Machine-Executable Playbooks</b></h2><p class="paragraph" style="text-align:left;">Based on everything I&#39;ve learned building these for real environments, here&#39;s what actually matters:</p><h3 class="heading" style="text-align:left;" id="1-explicit-decision-logic-no-ambigu"><b>1. Explicit Decision Logic (No Ambiguity, No Gaps)</b></h3><p class="paragraph" style="text-align:left;">Your decision thresholds must cover every possible confidence score from 0.0 to 1.0. No &quot;if unusual, escalate&quot; nonsense. Define EXACTLY what triggers each action.</p><p class="paragraph" style="text-align:left;">❌ Bad: <i>If suspicious, escalate to analyst</i></p><p class="paragraph" style="text-align:left;">✅<span style="color:rgb(56, 58, 66);"> Good:</span></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><td class="bh__table_cell" width="100%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(255, 255, 170);">decision_thresholds</span><span style="color:rgb(255, 255, 255);">:</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(255, 255, 170);">escalate_high</span><span style="color:rgb(255, 255, 255);">: {</span><span style="color:rgb(255, 255, 170);">range</span><span style="color:rgb(255, 255, 255);">: [</span><span style="color:rgb(211, 99, 99);">0.40</span><span style="color:rgb(255, 255, 255);">, </span><span style="color:rgb(211, 99, 99);">0.60</span><span style="color:rgb(255, 255, 255);">], </span><span style="color:rgb(255, 255, 170);">action</span><span style="color:rgb(255, 255, 255);">: analyst_review, </span><span style="color:rgb(255, 255, 170);">sla_hours</span><span style="color:rgb(255, 255, 255);">: </span><span style="color:rgb(211, 99, 99);">2</span><span style="color:rgb(255, 255, 255);">}</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(255, 255, 170);">escalate_critical</span><span style="color:rgb(255, 255, 255);">: {</span><span style="color:rgb(255, 255, 170);">range</span><span style="color:rgb(255, 255, 255);">: [</span><span style="color:rgb(211, 99, 99);">0.00</span><span style="color:rgb(255, 255, 255);">, </span><span style="color:rgb(211, 99, 99);">0.40</span><span style="color:rgb(255, 255, 255);">], </span><span style="color:rgb(255, 255, 170);">action</span><span style="color:rgb(255, 255, 255);">: incident_response, </span><span style="color:rgb(255, 255, 170);">sla_minutes</span><span style="color:rgb(255, 255, 255);">: </span><span style="color:rgb(211, 99, 99);">30</span><span style="color:rgb(255, 255, 255);">}</span></p></td></tr></table></div><h3 class="heading" style="text-align:left;" id="2-data-topology-and-entity-resoluti"><b>2. Data Topology and Entity Resolution</b></h3><p class="paragraph" style="text-align:left;">Your AI needs to know how to connect data across your specific tool stack. How do you go from alert email → Active Directory → CrowdStrike endpoint ID?</p><p class="paragraph" style="text-align:left;">This was implicit tribal knowledge in Part 1&#39;s world. In Part 2, it must be explicit:</p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><td class="bh__table_cell" width="100%"><p class="paragraph" style="text-align:left;"><span style="color:rgb(252, 194, 140);">entity_resolution</span><span style="color:rgb(255, 255, 255);">:</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(252, 194, 140);">crowdstrike_endpoint</span><span style="color:rgb(255, 255, 255);">:</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(252, 194, 140);">steps</span><span style="color:rgb(255, 255, 255);">:</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(252, 194, 140);">-</span><span style="color:rgb(255, 255, 255);"> {</span><span style="color:rgb(255, 255, 170);">action</span><span style="color:rgb(255, 255, 255);">: map, from: </span><span style="color:rgb(255, 255, 255);"><a class="link" href="https://alert.email?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=from-pdf-playbooks-to-machine-executable-logic" target="_blank" rel="noopener noreferrer nofollow">alert.email</a></span><span style="color:rgb(255, 255, 255);">, to: active_directory.userPrincipalName}</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(252, 194, 140);">-</span><span style="color:rgb(255, 255, 255);"> {</span><span style="color:rgb(255, 255, 170);">action</span><span style="color:rgb(255, 255, 255);">: get, field: active_directory.lastLogonComputer}</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(252, 194, 140);">-</span><span style="color:rgb(255, 255, 255);"> {</span><span style="color:rgb(255, 255, 170);">action</span><span style="color:rgb(255, 255, 255);">: map, from: active_directory.lastLogonComputer, to: crowdstrike.hostname}</span><br><span style="color:rgb(255, 255, 255);"> </span><span style="color:rgb(252, 194, 140);">fallback</span><span style="color:rgb(255, 255, 255);">: {</span><span style="color:rgb(255, 255, 170);">strategy</span><span style="color:rgb(255, 255, 255);">: use_cache, max_age_hours: </span><span style="color:rgb(211, 99, 99);">24</span><span style="color:rgb(255, 255, 255);">}</span></p></td></tr></table></div><h3 class="heading" style="text-align:left;" id="3-confidence-calibration-validated-"><b>3. Confidence Calibration (Validated Against Outcomes)</b></h3><p class="paragraph" style="text-align:left;">Remember in Part 1 when I said the feedback loop is broken because analysts ignore the step that says &quot;send false positives back to detection engineering&quot;?</p><p class="paragraph" style="text-align:left;">Machine-executable playbooks fix this by <b>requiring</b> outcome validation:</p><ul><li><p class="paragraph" style="text-align:left;">If AI says 90% confident benign, track how often it&#39;s actually benign</p></li><li><p class="paragraph" style="text-align:left;">Adjust confidence weights based on historical accuracy</p></li><li><p class="paragraph" style="text-align:left;">Recalibrate when you detect drift</p></li></ul><p class="paragraph" style="text-align:left;"><b>The confidence scores must be trustworthy, not aspirational.</b></p><h3 class="heading" style="text-align:left;" id="4-reproducible-metrics-and-evaluati"><b>4. Reproducible Metrics and Evaluation</b></h3><p class="paragraph" style="text-align:left;">When a vendor claims &quot;improves coverage from 50% to 95%,&quot; ask: &quot;95% of what, measured how?&quot;</p><p class="paragraph" style="text-align:left;">With machine-executable playbooks, you can test against:</p><ul><li><p class="paragraph" style="text-align:left;">Historical incidents with known outcomes</p></li><li><p class="paragraph" style="text-align:left;">Purple team exercises covering MITRE ATT&CK techniques</p></li><li><p class="paragraph" style="text-align:left;">Adversary emulation with documented expected results</p></li></ul><p class="paragraph" style="text-align:left;"><b>Define variant coverage as:</b> (# of distinct attack technique variants correctly triaged) / (total curated variants in test set)</p><p class="paragraph" style="text-align:left;">This separates real capability from marketing claims.</p><h3 class="heading" style="text-align:left;" id="5-safety-rails-and-governance"><b>5. Safety Rails and Governance</b></h3><p class="paragraph" style="text-align:left;">In Part 1, I talked about how deterministic automation needs approval workflows. The same applies here, but even more critically.</p><p class="paragraph" style="text-align:left;"><b>AI Agents handle:</b> Investigation, enrichment, triage decisions, confidence scoring, and recommending next steps</p><p class="paragraph" style="text-align:left;"><b>Deterministic automation handles:</b> Response execution with defined approval workflows, rate limiting, blast radius checks</p><p class="paragraph" style="text-align:left;"><b>Why this matters:</b> AI reasoning excels at weighing ambiguous evidence during investigations. However, response actions need predictability, auditability, and fail-safe controls.</p><p class="paragraph" style="text-align:left;"><b>Governance controls:</b></p><ul><li><p class="paragraph" style="text-align:left;">Confidence thresholds determine when AI can auto-close vs. escalate</p></li><li><p class="paragraph" style="text-align:left;">Escalation criteria define what triggers human involvement</p></li><li><p class="paragraph" style="text-align:left;">Override tracking captures when analysts disagree with AI (this feeds back into learning)</p></li></ul><h3 class="heading" style="text-align:left;" id="6-complete-observability-and-transp"><b>6. Complete Observability and Transparency</b></h3><p class="paragraph" style="text-align:left;">In Part 1, I said the problem with playbooks is they&#39;re ignored and never maintained. Part 2 solves this by making every AI decision traceable:</p><ul><li><p class="paragraph" style="text-align:left;">Complete audit trails showing data queried, confidence calculated, thresholds applied</p></li><li><p class="paragraph" style="text-align:left;">Reasoning chains explaining every decision step</p></li><li><p class="paragraph" style="text-align:left;">Metrics tracking accuracy, drift, and performance over time</p></li><li><p class="paragraph" style="text-align:left;">Testing frameworks for validating playbook changes before deployment</p></li></ul><p class="paragraph" style="text-align:left;"><b>Black boxes are unacceptable.</b> If you can&#39;t see how AI reaches conclusions, you cannot trust it, improve it, or measure its effectiveness.</p><p class="paragraph" style="text-align:left;">This is how you prevent Part 2 from becoming Part 1 all over again,broken processes that nobody maintains.</p><h2 class="heading" style="text-align:left;" id="two-paths-to-implementation-revisit"><b>Two Paths to Implementation (Revisited from Part 1)</b></h2><p class="paragraph" style="text-align:left;">In Part 1, I outlined how to build playbooks alongside detections. Now let&#39;s extend that with two approaches to machine-executable logic:</p><h3 class="heading" style="text-align:left;" id="route-1-customizable-intelligence"><b>Route 1: Customizable Intelligence</b></h3><p class="paragraph" style="text-align:left;"><b>The approach:</b> Build your own machine-executable playbooks for your specific environment. You control procedures, entity mappings, confidence weights, and thresholds.</p><p class="paragraph" style="text-align:left;"><b>Best for:</b> Mature security operations with established procedures, engineering resources to invest, and unique tool stacks requiring customization.</p><p class="paragraph" style="text-align:left;"><b>What you get:</b> Maximum control to encode your specific tribal knowledge and operational context,the &quot;instinct&quot; your best analysts use.</p><p class="paragraph" style="text-align:left;"><b>What it requires:</b> Security engineering resources to build, test, and maintain playbooks over time. This is the formalization of the behavioral learning I mentioned in Part 1.</p><h3 class="heading" style="text-align:left;" id="route-2-outofthe-box-intelligence"><b>Route 2: Out-of-the-Box Intelligence</b></h3><p class="paragraph" style="text-align:left;"><b>The approach:</b> Pre-trained AI with built-in investigation procedures based on security best practices and collective intelligence across many deployments.</p><p class="paragraph" style="text-align:left;"><b>Best for:</b> Faster time-to-value, teams lacking resources to build custom playbooks, organizations wanting proven procedures.</p><p class="paragraph" style="text-align:left;"><b>What you get:</b> Working baseline from day one, proven procedures, faster deployment.</p><p class="paragraph" style="text-align:left;"><b>What you can customize:</b> Thresholds, escalation criteria, and specific organizational context as you learn what works.</p><h3 class="heading" style="text-align:left;" id="the-non-negotiable-requirement"><b>The Non-Negotiable Requirement</b></h3><p class="paragraph" style="text-align:left;"><b>Regardless of path, transparency is mandatory.</b></p><p class="paragraph" style="text-align:left;">Remember the RPA problem I mentioned in Part 1? RPA solutions failed in cybersecurity because the tech wasn&#39;t there and the environment was too unpredictable.</p><p class="paragraph" style="text-align:left;">AI solves the unpredictability through non-deterministic reasoning. But only if you can:</p><p class="paragraph" style="text-align:left;">✓ See the investigation logic and understand what the AI does<br>✓ Trace the complete reasoning chain from alert to decision<br>✓ Audit all decisions with confidence scores and data sources<br>✓ Modify procedures as your requirements change<br>✓ Measure effectiveness with accuracy, learning, and drift metrics</p><p class="paragraph" style="text-align:left;"><b>Critical questions to ask any AI SOC platform:</b></p><ul><li><p class="paragraph" style="text-align:left;">Can I see the investigation logic being applied?</p></li><li><p class="paragraph" style="text-align:left;">How are confidence scores calculated?</p></li><li><p class="paragraph" style="text-align:left;">What happens when data sources are unavailable?</p></li><li><p class="paragraph" style="text-align:left;">How do you handle entity resolution across my specific tools?</p></li><li><p class="paragraph" style="text-align:left;">Can I test changes before deploying them?</p></li><li><p class="paragraph" style="text-align:left;">How do you measure and track accuracy over time?</p></li></ul><p class="paragraph" style="text-align:left;">Without answers to these, you&#39;re just automating chaos faster.</p><h2 class="heading" style="text-align:left;" id="the-bottom-line-completing-the-tran"><b>The Bottom Line: Completing the Transformation</b></h2><p class="paragraph" style="text-align:left;">In Part 1, I showed you why playbooks are broken and how to fix them by coupling them with detections. That solves the human problem.</p><p class="paragraph" style="text-align:left;">But Part 2 is the necessary evolution: <b>those human-readable playbooks don&#39;t work for AI execution</b>.</p><p class="paragraph" style="text-align:left;">Machine-executable SOPs bridge the gap between broader detections and manageable operations. They&#39;re what allow AI to triage thousands of alerts with the same quality your best analyst applies to dozens.</p><p class="paragraph" style="text-align:left;">This isn&#39;t better documentation. It&#39;s a fundamental shift in how security knowledge gets operationalized,moving from ambiguous human guidelines to explicit, testable, measurable logic that can be continuously improved.</p><p class="paragraph" style="text-align:left;"><b>The connection to Part 1:</b></p><ul><li><p class="paragraph" style="text-align:left;">Analysts ignore playbooks → Build them with detections</p></li><li><p class="paragraph" style="text-align:left;">Detections without playbooks break feedback loops → Automate what you can</p></li><li><p class="paragraph" style="text-align:left;">Analysts go by instinct → Capture that tribal knowledge</p></li><li><p class="paragraph" style="text-align:left;"><b>Now codify that knowledge into logic AI can execute → Measure and improve systematically</b></p></li></ul><p class="paragraph" style="text-align:left;"><b>The six requirements that matter:</b></p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Explicit decision logic</b> with complete coverage (no gaps, no ambiguity)</p></li><li><p class="paragraph" style="text-align:left;"><b>Data topology and entity resolution</b> (connecting data across your specific systems)</p></li><li><p class="paragraph" style="text-align:left;"><b>Confidence calibration</b> (trustworthy thresholds validated against outcomes)</p></li><li><p class="paragraph" style="text-align:left;"><b>Reproducible metrics</b> (defensible claims about coverage and accuracy)</p></li><li><p class="paragraph" style="text-align:left;"><b>Safety rails</b> (governance preventing business disruption)</p></li><li><p class="paragraph" style="text-align:left;"><b>Complete observability</b> (transparency enabling trust and improvement)</p></li></ol><p class="paragraph" style="text-align:left;">Whether you build custom playbooks or start with proven out-of-the-box intelligence, these requirements don&#39;t change. The platform must provide them, and you must be able to validate they&#39;re working in your specific environment.</p><p class="paragraph" style="text-align:left;"><b>Without Part 1, your processes stay broken.</b></p><p class="paragraph" style="text-align:left;"><b>Without Part 2, you&#39;re automating chaos faster.</b></p><p class="paragraph" style="text-align:left;"><b>With both, you&#39;re building a security operation that measurably improves over time.</b></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=from-pdf-playbooks-to-machine-executable-logic"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=e6e3ed53-b3ae-4eb8-aae4-6824ae32b8d0&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>How AI Transforms Detection Engineering</title>
  <description>From Narrow Precision to Broad Coverage</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/036c7de5-0056-4dc1-8832-e6a319ba2286/AI_SOC_comparison.gif" length="809030" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/how-ai-transforms-detection-engineering</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/how-ai-transforms-detection-engineering</guid>
  <pubDate>Tue, 14 Oct 2025 12:45:00 +0000</pubDate>
  <atom:published>2025-10-14T12:45:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><h1 class="heading" style="text-align:left;" id="part-1-of-3-the-detection-coverage-"><b>Part 1 of 3: The Detection Coverage Problem and How AI Solves It</b></h1><p class="paragraph" style="text-align:left;">Your SOC processes ten thousand alerts daily. Your detection engineer just wrote a brilliant new rule detecting lateral movement via WMI, but here’s what happens next:</p><p class="paragraph" style="text-align:left;">They look at the alert volume and realize it generates two hundred potential hits per day. They know your team can realistically investigate maybe twenty alerts per day for this detection type, so they start making the rule more restrictive. They add filters, raise thresholds, and narrow the scope until the alert volume drops to something manageable.</p><p class="paragraph" style="text-align:left;"><b>In doing so, they’ve just created a blind spot.</b></p><p class="paragraph" style="text-align:left;">Those one hundred and eighty alerts they filtered out might contain real threats, but your process design forced them to choose between overwhelming the team and potentially missing attacks.</p><p class="paragraph" style="text-align:left;">This is the fundamental problem we need to solve. Your processes were designed for human-in-the-loop execution, and that constraint is now the bottleneck strangling your security effectiveness.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#ff6800;"><b>AiStrike</b></span></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><div class="image"><a class="image__link" href="https://www.aistrike.com/contact?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" rel="noopener" target="_blank"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/7627f31e-524b-4ed9-a128-b59441bc33cc/Aistrike2.png?t=1760363005"/></a></div></td><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td></tr></table></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:center;"><b>AI SOC Done Right!</b></p></div><p class="paragraph" style="text-align:center;"><b>AI SOC Intelligence Fabric that unifies your data, accelerates investigations, and orchestrates intelligent response</b><br><br>Transform your SOC with composite AI that arrives pre-trained and ready to work. Enable small teams to operate like enterprise SOCs while giving enterprises state-of-the-art incident response capabilities.</p><p class="paragraph" style="text-align:center;"></p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="what-changed-today"><b>What changed today</b></h1><p class="paragraph" style="text-align:left;">Today&#39;s AI wave is not a plug-and-play upgrade for security operations. Just as the shift to cloud and SaaS forced organizations to realign processes, roles, and governance, <b>the AI wave demands a full reboot of your people-process-technology stack.</b></p><p class="paragraph" style="text-align:left;">This isn&#39;t about adding a new tool to your existing workflows. This is about fundamentally rethinking how security operations function when you remove the human throughput constraint from the equation.</p><h2 class="heading" style="text-align:left;" id="the-research-backs-this-up"><b>The Research Backs This Up</b></h2><p class="paragraph" style="text-align:left;">Recent research reveals an uncomfortable truth: data quality predicts success more than raw technology capacity, and process design often outweighs management intent in driving integration <a class="link" href="https://ideas.repec.org/a/eee/tefoso/v217y2025ics0040162525001921.html?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">[1]</a>. Meanwhile, cybersecurity researchers are exploring human-AI co-teaming models in SOCs, stressing the need for dynamic autonomy, trust calibration, and feedback loops in operational workflows <a class="link" href="https://arxiv.org/abs/2505.06394?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">[2]</a>.</p><p class="paragraph" style="text-align:left;"><b>The crux:</b> Dropping AI into a rigid SOC is like installing a jet engine on a cart with square wheels. The power is there, but the system isn&#39;t designed to harness it.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/b43ba294-cfc0-4eb5-be56-fc182379d85a/AI_SOC_cart.png?t=1760363641"/></div><h2 class="heading" style="text-align:left;" id="whats-really-changing"><b>What&#39;s Really Changing</b></h2><p class="paragraph" style="text-align:left;">Every major technology wave forces security teams to renegotiate the relationship between people, process, and technology:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Cloud era:</b> Reinvented access models, monitoring pipelines, identity governance</p></li><li><p class="paragraph" style="text-align:left;"><b>SaaS era:</b> Adapted to distributed ownership and ephemeral infrastructure</p></li><li><p class="paragraph" style="text-align:left;"><b>AI era:</b> Must handle systems that don&#39;t just observe, they <b>act, decide, and recommend</b></p></li></ul><p class="paragraph" style="text-align:left;">The challenge isn&#39;t visibility anymore. It&#39;s an <b>agency.</b> AI systems don&#39;t just help us monitor threats; they investigate, triage, and recommend actions. That shift means SOC processes can&#39;t remain static, checklists written for human cognition. They must become machine-executable logic that adapts to model confidence, context, and risk.</p><h1 class="heading" style="text-align:left;" id="the-brutal-trade-off-killing-your-d"><b>The Brutal Trade-Off: Killing Your Detection Coverage</b></h1><p class="paragraph" style="text-align:left;">Traditional detection engineering operated under constraints that forced you to sacrifice coverage for operational feasibility. Let me show you what this looks like in practice.</p><p class="paragraph" style="text-align:left;">The Typical Detection Engineering Process</p><p class="paragraph" style="text-align:left;"><b>Here&#39;s how it actually works:</b></p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Developp hypothesis</b> about a threat you want to detect</p></li><li><p class="paragraph" style="text-align:left;"><b>Build a detection rule</b> to identify that behavior</p></li><li><p class="paragraph" style="text-align:left;"><b>Test against your environment</b> to see alert volume</p></li><li><p class="paragraph" style="text-align:left;"><b>See 100 alerts per day</b> 😰</p></li><li><p class="paragraph" style="text-align:left;"><b>Realize your team can only handle 20 alerts per day</b></p></li><li><p class="paragraph" style="text-align:left;"><b>Make the detection more restrictive</b> (add filters, raise thresholds)</p></li><li><p class="paragraph" style="text-align:left;"><b>Deploy detection that catches 40% of attack variants</b> instead of 90%</p></li></ol><p class="paragraph" style="text-align:left;"><b>You weren&#39;t optimizing for security effectiveness. You were optimizing for operational survival.</b></p><h2 class="heading" style="text-align:left;" id="understanding-the-funnel-of-fidelit"><b>Understanding the Funnel of Fidelity</b></h2><p class="paragraph" style="text-align:left;">Zack Allen in the Detection Field Manual #3 talks about detection efficency concept of the <b>Funnel of Fidelity </b>(introduce by <a class="link" href="https://medium.com/@jaredcatkinson?source=post_page---byline--b1bb59b04036---------------------------------------&utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow" style="color: inherit">Jared Atkinson</a> back in 2019)  to describe this exact problem<a class="link" href="https://www.detectionengineering.net/p/detection-field-manual-3-what-is?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">[3]</a>: massive data volume at the top, limited analyst capacity at the bottom. Every alert that survives the funnel consumes human focus, creating an inherent trade-off between comprehensive detection and operational sustainability.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/89fc3978-9578-4f09-97a1-5281e9078045/Funnel_of_fidelity.jpg?t=1760363956"/></div><p class="paragraph" style="text-align:left;">This creates a dangerous dynamic. You might achieve <b>eighty percent detection coverage</b>, meaning your rules can theoretically identify eighty percent of relevant security events in your environment. However, analyst capacity constraints mean you can only thoroughly investigate <b>fifty or sixty percent</b> of the alerts those detections generate.</p><p class="paragraph" style="text-align:left;"><b>Your effective security coverage isn&#39;t 80%, it&#39;s the 40-50% that actually receives quality investigation.</b></p><h2 class="heading" style="text-align:left;" id="the-attackers-advantage"><b>The Attacker&#39;s Advantage</b></h2><p class="paragraph" style="text-align:left;">This coverage gap becomes an exploitable vulnerability. Attackers need only operate in the 20-30% of alert volume that your team doesn&#39;t have the capacity to investigate. They can:</p><ul><li><p class="paragraph" style="text-align:left;">Generate low-level alerts that get suppressed automatically</p></li><li><p class="paragraph" style="text-align:left;">Operate during high-volume periods when your team is overwhelmed</p></li><li><p class="paragraph" style="text-align:left;">Use techniques that generate alerts your team habitually ignores due to high false positive rates</p></li></ul><p class="paragraph" style="text-align:left;"><b>The gap between what you detect and what you investigate is where attackers live.</b></p><hr class="content_break"><h1 class="heading" style="text-align:left;" id="how-ai-changes-the-detection-engine"><b>How AI Changes the Detection Engineering Equation</b></h1><p class="paragraph" style="text-align:left;">When investigation capacity increases from 20 alerts per analyst per day to thousands of alerts per AI agent per day, everything changes. You can finally deploy the detections you always wanted to build.</p><p class="paragraph" style="text-align:left;"><b>Before vs. After: The Transformation</b></p><div style="padding:14px 7px 14px;"><table class="bh__table" width="100%" style="border-collapse:collapse;"><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:center;"><b>Before AI</b></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:center;"><b>After AI</b></p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">Detection generates 100 alerts/day</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">Detection generates 100 alerts/day</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">Team can handle 20/day</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">AI triages all 100</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">80 alerts ignored or suppressed</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">70 auto-closed (benign activity + false positives)</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">Must narrow detection scope</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">20 escalated (ambiguous, with full context)</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">Catches 40% of attack variants</p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;">10 true positives flagged (ready for response)</p></td></tr><tr class="bh__table_row"><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"></p></td><td class="bh__table_cell" width="50%"><p class="paragraph" style="text-align:left;"><b>Catches 90% of attack variants</b></p></td></tr></table></div><h1 class="heading" style="text-align:left;" id="the-key-shift"><b>The Key Shift</b></h1><p class="paragraph" style="text-align:left;">With AI, you move from <b>precision-optimized detection</b> to <b>coverage-optimized detection</b>.</p><p class="paragraph" style="text-align:left;"><b>Precision-optimized (old way):</b></p><ul><li><p class="paragraph" style="text-align:left;">Question: &quot;How can I make this detection narrow enough to be sustainable?&quot;</p></li><li><p class="paragraph" style="text-align:left;">Result: Restrictive filters, high thresholds, missed attack variants</p></li><li><p class="paragraph" style="text-align:left;">Coverage: 30-40% of the actual threat landscape</p></li></ul><p class="paragraph" style="text-align:left;"><b>Coverage-optimized (new way):</b></p><ul><li><p class="paragraph" style="text-align:left;">Question: &quot;How can I make this detection broad enough to catch all variants while maintaining signal quality?&quot;</p></li><li><p class="paragraph" style="text-align:left;">Result: Comprehensive coverage, AI handles triage burden</p></li><li><p class="paragraph" style="text-align:left;">Coverage: 85-95% of the actual threat landscape</p></li></ul><p class="paragraph" style="text-align:left;">The detection engineer&#39;s job transforms completely. Instead of adding restrictive filters to reduce volume, she focuses on adding context that helps the AI make accurate disposition decisions. Instead of tuning for low volume, she tunes for high recall, knowing the AI can handle the resulting triage burden.<a class="link" href="https://www.detectionatscale.com/p/the-ai-powered-detection-engineer?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">[4]</a></p><h2 class="heading" style="text-align:left;" id="understanding-the-alert-categories">Understanding the Alert Categories</h2><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>(Updated section : Thank you </i></span><span style="font-size:0.8rem;"><a class="link" href="https://www.linkedin.com/in/security-neades/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(10, 102, 194)"><i>Nathan Eades</i></a></span><span style="font-size:0.8rem;"><i> for the feedback)</i></span><br>When we talk about the triage burden, we&#39;re actually dealing with two distinct categories:</p><p class="paragraph" style="text-align:left;"><b>Benign Alerts</b>: The detection is working correctly; it identified the behavior it was designed to catch. But the activity is legitimate, authorized, or expected.</p><ul><li><p class="paragraph" style="text-align:left;">Example: Your lateral movement detection correctly flags WMI activity, but it&#39;s authorized IT maintenance during a change window</p></li><li><p class="paragraph" style="text-align:left;">Problem: Requires context to distinguish legitimate from malicious</p></li></ul><p class="paragraph" style="text-align:left;"><b>False Positives</b>: The detection is firing incorrectly due to overly broad rules or environmental noise.</p><ul><li><p class="paragraph" style="text-align:left;">Example: Your detection fires on normal admin behavior because it doesn&#39;t account for privileged user patterns</p></li><li><p class="paragraph" style="text-align:left;">Problem: The detection rule itself needs tuning</p></li></ul><p class="paragraph" style="text-align:left;">Traditional SOCs struggled with both:</p><ul><li><p class="paragraph" style="text-align:left;">Benign alerts required manual context gathering (check change tickets, verify with user, confirm authorization)</p></li><li><p class="paragraph" style="text-align:left;">False positives required detection tuning, but that tuning often meant narrowing the rule and missing real threats</p></li></ul><p class="paragraph" style="text-align:left;">AI handles both categories intelligently:</p><ul><li><p class="paragraph" style="text-align:left;">For benign alerts: AI gathers context automatically (change windows, user roles, business justification) to determine legitimacy</p></li><li><p class="paragraph" style="text-align:left;">For false positives: AI identifies systematic patterns and suggests detection improvements</p></li></ul><p class="paragraph" style="text-align:left;">The result: You can deploy broader detections because AI can distinguish between malicious activity, benign activity, and false positives at scale.</p><h1 class="heading" style="text-align:left;" id="the-transformation-in-detection-phi"><b>The Transformation in Detection Philosophy</b></h1><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/036c7de5-0056-4dc1-8832-e6a319ba2286/AI_SOC_comparison.gif?t=1760456583"/></div><p id="this-isnt-just-about-automation-mak" class="paragraph" style="text-align:left;">This isn&#39;t just about automation making things faster. It&#39;s a fundamental shift in how you approach detection engineering.</p><h2 class="heading" style="text-align:left;" id="traditional-detection-engineering"><b>Traditional Detection Engineering</b></h2><p class="paragraph" style="text-align:left;"><b>Guiding questions:</b></p><ul><li><p class="paragraph" style="text-align:left;">Will this detection generate too many alerts?</p></li><li><p class="paragraph" style="text-align:left;">Can our team handle the volume?</p></li><li><p class="paragraph" style="text-align:left;">How can I make this more restrictive without losing too much coverage?</p></li></ul><p class="paragraph" style="text-align:left;"><b>Optimization goal:</b> Operational sustainability</p><p class="paragraph" style="text-align:left;"><b>Trade-off:</b> Coverage sacrificed for precision</p><p class="paragraph" style="text-align:left;"><b>Result:</b> Narrow detections that miss attack variants</p><h2 class="heading" style="text-align:left;" id="ai-enabled-detection-engineering"><b>AI-Enabled Detection Engineering</b></h2><p class="paragraph" style="text-align:left;"><b>Guiding questions:</b></p><ul><li><p class="paragraph" style="text-align:left;">Does this detection catch the full breadth of attacker behavior?</p></li><li><p class="paragraph" style="text-align:left;">What context does AI need to make accurate triage decisions?</p></li><li><p class="paragraph" style="text-align:left;">How can I optimize for recall without sacrificing signal quality?</p></li></ul><p class="paragraph" style="text-align:left;"><b>Optimization goal:</b> Security effectiveness</p><p class="paragraph" style="text-align:left;"><b>Trade-off:</b> Let AI handle triage burden, focus on coverage</p><p class="paragraph" style="text-align:left;"><b>Result:</b> Broad detections that catch attack variants while maintaining a manageable analyst workload</p><h2 class="heading" style="text-align:left;" id="key-metrics-that-change"><b>Key Metrics That Change</b></h2><p class="paragraph" style="text-align:left;">Traditional metrics focused on <b>volume management:</b></p><ul><li><p class="paragraph" style="text-align:left;">✓ Alerts per day per detection</p></li><li><p class="paragraph" style="text-align:left;">✓ Analyst handling capacity</p></li><li><p class="paragraph" style="text-align:left;">✓ Alert-to-incident ratio</p></li></ul><p class="paragraph" style="text-align:left;">New metrics focus on <b>coverage and learning:</b></p><ul><li><p class="paragraph" style="text-align:left;">✓ <b>Detection recall:</b> Of all malicious events, how many did we catch?</p></li><li><p class="paragraph" style="text-align:left;">✓ <b>AI triage accuracy:</b> Of AI&#39;s auto-close decisions, what percentage are correct?</p></li><li><p class="paragraph" style="text-align:left;">✓ <b>Analyst amplification:</b> How many alerts can each analyst effectively handle with AI assistance?</p></li><li><p class="paragraph" style="text-align:left;">✓ <b>Feedback utilization:</b> Is analyst feedback improving AI accuracy over time?</p></li></ul><h1 class="heading" style="text-align:left;" id="what-this-means-for-your-soc"><b>What This Means for Your SOC</b></h1><p class="paragraph" style="text-align:left;">The transformation from narrow, precision-focused detections to broad, coverage-optimized detections has implications that ripple through your entire security operations:</p><h3 class="heading" style="text-align:left;" id="for-detection-engineers"><b>For Detection Engineers</b></h3><p class="paragraph" style="text-align:left;"><b>New responsibilities:</b></p><ul><li><p class="paragraph" style="text-align:left;">Build comprehensive detections without volume anxiety</p></li><li><p class="paragraph" style="text-align:left;">Add context and enrichment logic to help AI triage</p></li><li><p class="paragraph" style="text-align:left;">Focus on recall and coverage rather than precision and volume</p></li><li><p class="paragraph" style="text-align:left;">Monitor AI triage performance and tune based on feedback</p></li></ul><p class="paragraph" style="text-align:left;"><b>Time allocation shift:</b></p><ul><li><p class="paragraph" style="text-align:left;">Less: Manual alert triage to validate detection quality</p></li><li><p class="paragraph" style="text-align:left;">More: Detection development, coverage expansion, AI tuning</p></li></ul><h3 class="heading" style="text-align:left;" id="for-soc-analysts"><b>For SOC Analysts</b></h3><p class="paragraph" style="text-align:left;"><b>New workflow:</b></p><ul><li><p class="paragraph" style="text-align:left;">Receive 20-30 pre-investigated cases per day instead of 200+ raw alerts</p></li><li><p class="paragraph" style="text-align:left;">Each case includes a full context gathered by AI</p></li><li><p class="paragraph" style="text-align:left;">Focus on judgment call and let the AI do the data gathering</p></li><li><p class="paragraph" style="text-align:left;">Provide feedback that improves AI over time</p></li></ul><p class="paragraph" style="text-align:left;">(<span style="font-size:0.8rem;"><i>updated section, thank yo,u </i></span><span style="font-size:0.8rem;"><span style="text-decoration:underline;"><a class="link" href="https://www.linkedin.com/in/roger-w-roberts-5200b42/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(10, 102, 194)"><i>Roger W. Roberts</i></a></span></span><span style="font-size:0.8rem;"><span style="text-decoration:underline;"><i>, for the feedback)</i></span></span></p><h3 class="heading" style="text-align:left;" id="for-security-outcomes"><b>For Security Outcomes</b></h3><p class="paragraph" style="text-align:left;"><b>Coverage improvement:</b></p><ul><li><p class="paragraph" style="text-align:left;">From: 40-50% effective coverage (detect 80%, investigate 50%)</p></li><li><p class="paragraph" style="text-align:left;">To: 75-80% effective coverage (detect 80%, investigate 95%)</p></li></ul><h1 class="heading" style="text-align:left;" id="the-bottom-line"><b>The Bottom Line</b></h1><p class="paragraph" style="text-align:left;">The shift from playbooks to agentic systems will be messy but inevitable. AI is pulling SOCs from static logic toward adaptive, self-improving systems. If the cloud era abstracted infrastructure, the AI era abstracts decision-making. Our processes must now teach machines how to operate within boundaries, not just describe what humans should do. That&#39;s not automation. That&#39;s architecture.</p><p class="paragraph" style="text-align:left;">But here&#39;s the critical insight: <b>This only works if you redesign your processes to take advantage of it.</b></p><p class="paragraph" style="text-align:left;">Deploying broader detections into your current manual triage process just creates a bigger backlog. You need to transform how you handle the resulting alerts. That&#39;s where machine-executable investigation procedures come in.</p><h1 class="heading" style="text-align:left;" id="coming-in-part-2-from-pdf-playbooks"><b>Coming in Part 2: From PDF Playbooks to Machine-Executable Logic</b></h1><p class="paragraph" style="text-align:left;">Broader detection coverage only works if your investigation procedures can handle the volume. In <b>Part 2</b>, we&#39;ll explore the transformation that makes this possible:</p><p class="paragraph" style="text-align:left;"><b>You&#39;ll learn:</b></p><ul><li><p class="paragraph" style="text-align:left;">Why your current SOPs don&#39;t work for AI (and what to do about it)</p></li><li><p class="paragraph" style="text-align:left;">How to convert human-readable playbooks into machine-executable logic</p></li><li><p class="paragraph" style="text-align:left;">A complete example: Suspicious login investigation (before and after)</p></li><li><p class="paragraph" style="text-align:left;">How does this transformation change the coverage funnel from 50% to 100% triage</p></li><li><p class="paragraph" style="text-align:left;">What this means operationally for your SOC team</p></li></ul><p class="paragraph" style="text-align:left;">The process tof ransformation is just as critical as technology. Get the SOP design wrong, and your AI will be making decisions based on incomplete or inconsistent logic. Get it right, and you unlock comprehensive coverage that was previously impossible.</p><p class="paragraph" style="text-align:left;"><b>Next week, we&#39;ll show you exactly how to do it.</b></p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h1 class="heading" style="text-align:left;">Vendor Spotlight: <span style="color:#ff6800;">AiStrike</span></h1><p class="paragraph" style="text-align:left;"><br>Recently, I had the opportunity to demo<a class="link" href="https://www.aistrike.com/contact?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow"> AIStrike</a>, and what immediately stood out was how the platform delivers full AI SOC capabilities built on three foundational pillars that directly address the transformation we&#39;ve been discussing.</p><h3 class="heading" style="text-align:left;"><b>Pillar 1: The SOC Force Multiplier</b></h3><p class="paragraph" style="text-align:left;"><b>For Your People:</b><br> AIStrike transforms a small team into an enterprise-grade SOC capability. If you&#39;re currently relying on an MDR, this platform lets you bring that intelligence in-house, giving you more control at a lower cost.</p><ul><li><p class="paragraph" style="text-align:left;">Transform three analysts into a 30-person SOC capability</p></li><li><p class="paragraph" style="text-align:left;">Reduce alert fatigue dramatically</p></li><li><p class="paragraph" style="text-align:left;">Elevate junior analysts to perform like seniors</p></li><li><p class="paragraph" style="text-align:left;">Free senior analysts for strategic threat hunting and detection engineering</p></li></ul><p class="paragraph" style="text-align:left;"><b>For Your Technology:</b><br>This is a technology enabler, not a rip-and-replace project. AIStrike unlocks the value of your existing security stack through extensive pre-built integrations and orchestration across all your tools. No need to abandon your current investments.</p><h3 class="heading" style="text-align:left;"><b>Pillar 2: Investigation Depth, Not Just Speed</b></h3><p class="paragraph" style="text-align:left;">AIStrike doesn&#39;t just summarize alerts; it builds the complete investigation story. This is exactly what we discussed: comprehensive context gathering that enables the 30% → 95% coverage improvement in our credential stuffing example.</p><p class="paragraph" style="text-align:left;">The platform delivers:</p><ul><li><p class="paragraph" style="text-align:left;">Automated enrichment from identity providers, threat intel, and EDR platforms</p></li><li><p class="paragraph" style="text-align:left;">VPN logs, user behavior patterns, and threat intelligence are pulled simultaneously</p></li><li><p class="paragraph" style="text-align:left;">Your organization&#39;s risk policies are applied to make disposition decisions</p></li><li><p class="paragraph" style="text-align:left;">Pre-investigated cases with full context, reducing investigation time from 30 minutes to 5 minutes</p></li></ul><p class="paragraph" style="text-align:left;"><b>What this means practically:</b> Deploy those comprehensive detections (500 alerts/day). AIStrike&#39;s AI triages all 500, auto-closes the 420 false positives with documented reasoning, escalates the 60 ambiguous cases with context, and flags the 20 true threats for immediate response.</p><h3 class="heading" style="text-align:left;"><b>Pillar 3: Continuous Intelligence Loop</b></h3><p class="paragraph" style="text-align:left;">This is the self-tuning SOC we&#39;ve been describing, a feedback loop that sharpens over time:</p><ul><li><p class="paragraph" style="text-align:left;">Pre-trained on millions of security events</p></li><li><p class="paragraph" style="text-align:left;">Learns from your environment without disruption</p></li><li><p class="paragraph" style="text-align:left;">Self-tunes to reduce noise over time</p></li><li><p class="paragraph" style="text-align:left;">Adapts to emerging threats automatically</p></li><li><p class="paragraph" style="text-align:left;">Captures analyst feedback and decisions</p></li><li><p class="paragraph" style="text-align:left;">Tracks AI performance metrics to show measurable improvement</p></li></ul><p class="paragraph" style="text-align:left;"><b>The result:</b> Your SOC gets progressively smarter as the AI learns which signals matter most in your specific environment. Your detection engineers can finally optimize for recall instead of precision, knowing the AI will handle the triage burden intelligently.</p><p class="paragraph" style="text-align:left;"><b>Learn more:</b><a class="link" href="https://www.aistrike.com/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow"> </a><a class="link" href="https://AIStrike.com?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering" target="_blank" rel="noopener noreferrer nofollow">AIStrike.com</a><span style="color:rgb(17, 85, 204);"><span style="text-decoration:underline;">.</span></span></p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://secops-unpacked.ai/mediakit?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/secops-unpacked/30min?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=how-ai-transforms-detection-engineering"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=30628143-edc4-4e86-9de8-07c80c9fafd7&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Rebranding Announcement</title>
  <description>CyberSec Automation is now SecOps Unpacked</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/8d99b230-4f8b-484e-b606-32ebf1154b31/CyberSec_Automation_Blog.png" length="207125" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/rebranding-announcement</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/rebranding-announcement</guid>
  <pubDate>Fri, 10 Oct 2025 11:30:00 +0000</pubDate>
  <atom:published>2025-10-10T11:30:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;"></p><h1 class="heading" style="text-align:center;" id="news">❗️News ❗️</h1><p class="paragraph" style="text-align:left;"><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">I have been running the cybersec-automation blog for over two years now, and I decided it is time for a change.</span><br><br><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">So, I&#39;m launching SecOps Unpacked, which is a sort of rebranding or simply expanding on what I was already doing. </span><br><br><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">While automation remains a core focus, I realised that security practitioners need more than just automation insights; they need independent research, practical frameworks, and honest vendor analysis.</span><br><br><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">I went with the idea of unpacking the security operations problems, exploring real solutions, and sharing what actually works in the field.</span><br><br><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">Some additions that you will notice are the Market research section as well tooling section (where I started a GitHub repo and soon will be sharing more Open Source tools)</span><br><br><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">I will keep my blog on the old domain until I figure out how to re-index everything and apply proper redirects. </span><br><br><span style="color:rgba(0, 0, 0, 0.9);font-family:-apple-system, system-ui, "system-ui", "Segoe UI", Roboto, "Helvetica Neue", "Fira Sans", Ubuntu, Oxygen, "Oxygen Sans", Cantarell, "Droid Sans", "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Lucida Grande", Helvetica, Arial, sans-serif;font-size:14px;">Also, don&#39;t forget to check out the latest section, where I have a tracker of the AI SOC and Automation vendors (in-depth analysis coming soon)!</span></p><div class="embed"><a class="embed__url" href="https://secops-unpacked.ai?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=rebranding-announcement" target="_blank"><div class="embed__content"><p class="embed__title"> SecOps Unpacked - Research & Analysis for Security Practitioners </p><p class="embed__description"> Unpacking SecOps problems. Exploring solutions. Sharing what actually works. Research-focused content for security practitioners and SOC engineers. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/5394b780-229f-4470-9070-b4aabef77233/Secops_Unpacked_Logo_transparent_.png?t=1756367088"/></a></div></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=4d42d562-fb9b-45a2-b9f4-5e25da2b2a77&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>AI SOC Core Component</title>
  <description>Uncover the essential core capabilities of AI SOC platforms: A deep dive into key implementation strategies and transformative technologies for modern cybersecurity teams.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/58c54c29-b175-45b0-9d7b-2df8405dcc94/AI_SOC_Capabilities_Diagram.gif" length="254981" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/ai-soc-core-component</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/ai-soc-core-component</guid>
  <pubDate>Thu, 02 Oct 2025 14:30:00 +0000</pubDate>
  <atom:published>2025-10-02T14:30:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">Based on what I&#39;ve been hearing from the cybersecurity community, many of you are asking what the core capabilities of an AI SOC platform are that you should actually be looking at. A while back, I put together a blog that went through some of the high-level steps for implementation. This time, I want to deep-dive into the core capabilities as I see them.</p><p class="paragraph" style="text-align:left;">You&#39;ve probably seen my &quot;<a class="link" href="https://www.cybersec-automation.com/p/ai-soc-shift-left-and-shift-right?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component" target="_blank" rel="noopener noreferrer nofollow">AI SOC Shift</a>&quot; maps and graphics. They do a pretty good job of outlining the core pillars these platforms are targeting. It&#39;s important to see if they relate to your problems and to understand what type of platform you really need.</p><p class="paragraph" style="text-align:left;">First, I’ll discuss the different implementation styles. Then, we’ll discuss data ingestion and what it looks like for AI SOC platforms. Finally, we&#39;ll cover the super important knowledge graph/DB. We&#39;ll also discuss investigations and, in the end, the response and feedback loop.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><a class="link" href="https://www.crogl.com/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component" target="_blank" rel="noopener noreferrer nofollow"><b>Crogl</b></a></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><div class="image"><a class="image__link" href="https://www.crogl.com/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/63fb4a75-172b-4e8f-b526-67e20cce4238/Screenshot_2025-10-01_at_00.07.59.png?t=1759266503"/></a></div></td><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td></tr></table></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h3 class="heading" style="text-align:center;"><b>Built for analysts. Powered by your data. Private design</b></h3></div><p class="paragraph" style="text-align:left;">▪️<b>Faster investigation</b>s - Cut Mean Time to Investigate (MTTI) by over 60%.<br>▪️<b>Analyst-first design</b> - Augments, never replaces. Built for real SOC workflows.<br>▪️<b>Operational anywhere</b> - Cloud, on-prem, and air-gapped environments.<br>▪️<b>Customer-managed AI</b> - Privacy, control, and compliance built in.<br>▪️<b>Knowledge Engine</b> - Automate triage, collects evidence, and documents everything.<br></p><p class="paragraph" style="text-align:center;">CISO/SOC/MSSP pros, we’d love to meet you.</p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="implementation-styles">Implementation Styles</h1><p class="paragraph" style="text-align:left;">From what I’ve seen, there are a few types of implementations out there. We can start with the classic options like On-prem, Bring Your Own Cloud (BYOC), and SaaS. But what’s even more interesting is that some of these platforms now offer the option to bring your own LLM as well. There are some vendors moving into this space (check out the Vendor Spotlight section if you&#39;re interested).</p><p class="paragraph" style="text-align:left;">I think this is going to be really relevant for large enterprises. Many of them are starting to develop their own internal LLMs and will want to use them. So, it’s a good sign that we&#39;re seeing vendors come up with capabilities that are truly enterprise-ready.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/24b2832d-d0cc-499b-b931-2e649157f5ac/Screenshot_2025-09-26_at_13.46.32.png?t=1759267321"/><div class="image__source"><span class="image__source_text"><p><a class="link" href="https://softwareanalyst.io/reports/ai-soc-industry-wide-report-2025/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component" target="_blank" rel="noopener noreferrer nofollow">https://softwareanalyst.io/reports/ai-soc-industry-wide-report-2025</a></p></span></div></div><h1 class="heading" style="text-align:left;" id="data-ingestion">Data Ingestion</h1><p class="paragraph" style="text-align:left;">Here we have a few options as well. This is based on the vendors I’ve seen (demo, trial, or implemented), which is a bit over 30 in the AI SOC and next-gen security automation space.</p><p class="paragraph" style="text-align:left;">First, you have the platforms that work just on top of your detections. These are the most common. They live on top of your detection layer, which can be a mix of SIEM, EDR, XDR, ITDR, Email Protection, and many others. What&#39;s important to consider here is what kind of tech they support. In my view, if it’s just about detection tech and excludes the SIEM, I want it to cover <i>all</i> my detection tools. Otherwise, you’re left with stuff you still need to handle manually or with your SOAR process.</p><p class="paragraph" style="text-align:left;">For the platforms that also ingest from a SIEM, you should know that not all of them support every type of detection. This means many of the custom or unique detections you’ve built in your environment might not be supported, creating a gap.</p><p class="paragraph" style="text-align:left;">Then there are others that live mainly on top of a SIEM or SOAR. This means you ingest everything you can into your SIEM, and the AI SOC platform takes any detection alert that comes out of it. The advantage here is that you can get really good coverage, as good as your SIEM allows. I&#39;ve tried both implementations, and this one usually provides better results, assuming you can afford to get all your data into the SIEM.</p><p class="paragraph" style="text-align:left;">One last thing here: some platforms can analyze your detections and come back with recommendations. Others will just ingest them and don’t put much effort into understanding why a rule runs in a specific way. For me, it&#39;s pretty important that the AI SOC platform tries to understand the logic of the rule, not just the alert it produces.</p><div class="image"><a class="image__link" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/6ed8af8a-524e-4548-be0b-e7a8d0e99143/AI_SOC_Capabilities_Diagram.gif?t=1759267381"/></a></div><h1 class="heading" style="text-align:left;" id="the-brains-knowledge-graph-db-enric">The Brains: Knowledge Graph/DB (Enrichment and Context)</h1><p class="paragraph" style="text-align:left;">This is a key component for any AI SOC solution. See it as the smart enrichment and knowledge automation engine that should go out and grab all the information it needs to understand an alert better.</p><p class="paragraph" style="text-align:left;">From what I’ve seen, some platforms can connect to various tools that provide this information, from EDR, IAM, and Case Management to IaaS, Code Repos, and external threat intel feeds. Some might even give you some of that TI for free if you don’t want to bring your own.</p><p class="paragraph" style="text-align:left;">I think this is critical for two reasons. First, to understand any alert, you need internal context. Think about whether the platform can ingest all the knowledge from your team, that means past incidents from Jira, wikis on Confluence or Notion, or documents on SharePoint. If you’re comfortable with it, see if they can even pull from specific IM channels where the team discusses cases.</p><p class="paragraph" style="text-align:left;">Second, it&#39;s key to be able to connect to your internal case management solution like ServiceNow or Jira, or even GitHub repos. This allows the AI to check for relevant tickets or change requests related to the activity it&#39;s seeing.</p><p class="paragraph" style="text-align:left;">So, put a lot of effort into evaluating this part. Make sure you can connect the tools you have so the platform can learn from your environment.</p><h1 class="heading" style="text-align:left;" id="the-investigation-engine">The Investigation Engine</h1><p class="paragraph" style="text-align:left;">This part can go into so many details that I&#39;ll probably do a follow-up blog on it. You can also check out a previous article where I walk through handling an EDR alert.</p><p class="paragraph" style="text-align:left;">There are many different ways this is done, and many AI SOCs have their own method for stitching data together. But as far as capabilities, I’m looking for the following:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Does it use response playbooks?</b> I want a way to define custom scenarios or import my existing playbooks into the platform. That way, the platform is aware not just of best practices but also of my internal processes. In my own testing, I tried running it without any guidance from my playbooks, and the results weren&#39;t great. The investigation quality actually got worse over time.</p></li><li><p class="paragraph" style="text-align:left;"><b>What&#39;s the right mix of guidance?</b> I also tried adding my playbooks and letting the AI mainly follow that, and the results were good but a bit limited. We realized this would mean constantly updating our playbooks. The third approach, which got the best results, was to combine our internal playbooks with the platform&#39;s best practices. It understood our environment better and used all the log sources it needed to draw a conclusion. Plus, it took paths that were not in our playbooks but made sense in that specific context.</p></li><li><p class="paragraph" style="text-align:left;"><b>Don&#39;t fall for the speed trap.</b> These platforms mainly run API queries or search the SIEM. This means some investigations will only be as fast as your other tech. You have API rate limits and SIEM performance limitations. (Note: if your SIEM pricing is based on the number of queries you run, an AI will go a bit wild and run many more queries than a human would).</p></li><li><p class="paragraph" style="text-align:left;"><b>Parallel vs. Sequential.</b> It&#39;s also important to check if the platform runs actions in parallel or one after another. In security investigations, parallel actions don&#39;t always work because you often need to pivot based on what you find. Parallel makes sense for enrichment, but not for reactive threat hunting.</p></li><li><p class="paragraph" style="text-align:left;"><b>Self-Verification.</b> And one last point: does the AI verify and check itself once it completes an investigation? I&#39;ve seen that when it does, it usually comes up with better outcomes.</p></li><li><p class="paragraph" style="text-align:left;"><b>The Copilot.</b> I can&#39;t forget the AI Copilot. At first, I thought it was mainly for starting a threat hunt, but I also want it available <i>during</i> an investigation. You should be able to pick up where the case was escalated and ask questions about specific steps or just continue the investigation yourself. It&#39;s important to make these interactions visible so all analysts can see what others have investigated. Good auditing and sharing options are key.</p></li></ul><h1 class="heading" style="text-align:left;" id="taking-action-remediation-and-respo">Taking Action: Remediation and Response</h1><p class="paragraph" style="text-align:left;">On this part, not many platforms are going all-in, mainly because response is harder to automate and it&#39;s something where you want more deterministic, predictable automation. From what I’ve seen, there are three types of capabilities:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Suggestions:</b> They come up with response and remediation suggestions. This is the baseline I would expect. The key here is whether they understand your environment and suggest something that makes sense or just give you generic best-practice advice.</p></li><li><p class="paragraph" style="text-align:left;"><b>Basic Actions:</b> These are the ones that have some simple response actions, like blocking an IP, suspecting a user session, resetting a password, doing an AI Bot interview with a user, alerting via IM, or quarantining a machine. I like this, as in some cases that’s all you need. It’s easy and convenient.</p></li><li><p class="paragraph" style="text-align:left;"><b>Native Automation:</b> This is the third type, where platforms start to offer native automation capabilities like those in a SOAR platform, where you can build your own custom response workflows.</p></li></ol><h1 class="heading" style="text-align:left;" id="closing-the-loop-lessons-learned">Closing the Loop: Lessons Learned</h1><p class="paragraph" style="text-align:left;">And the last part. Here we have a few capabilities to look for.</p><ul><li><p class="paragraph" style="text-align:left;"><b>Summaries & Reports:</b> All platforms do alert and incident summaries; it’s like a core feature. But there are different types. Some allow you to create executive reports and give them a template for how it should look. You don&#39;t want to present reports to your management that are in a different style every time, so consistency is important. Others can do a summary of specific alerts you select and let you add artifacts to tailor it.</p></li><li><p class="paragraph" style="text-align:left;"><b>The Feedback Loop:</b> This is where things get interesting.</p><ul><li><p class="paragraph" style="text-align:left;">Some platforms give you no feedback mechanism. :)</p></li><li><p class="paragraph" style="text-align:left;">Then you have the ones that offer basic suggestions, usually based on a summary report or dashboard.</p></li><li><p class="paragraph" style="text-align:left;">Others come with suggestions on how to improve your detections. (This is my favorite,it’s what I want and I’ve even started to use it).</p></li><li><p class="paragraph" style="text-align:left;">The ideal is a platform that gives you suggestions for both detection improvements and process improvements.</p></li></ul></li></ul><h1 class="heading" style="text-align:left;" id="final-thoughts">Final Thoughts</h1><p class="paragraph" style="text-align:left;">Evaluating an AI SOC platform isn&#39;t about finding a single killer feature. It&#39;s about understanding how all these different pieces, ingestion, knowledge, investigation, response, and feedback, work together. The goal isn&#39;t just to find a tool that closes alerts fast. It&#39;s to find a partner that can learn from your environment, adapt to your processes, and ultimately make your entire security program smarter. You need a system that thinks and learns with you, not just another black box.</p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: </b>Crogl</h2><p class="paragraph" style="text-align:left;">The Crogl team recently walked me through their platform, and a few things stood out that are worth calling out here.</p><p class="paragraph" style="text-align:left;">First, Crogl is built with large enterprises in mind. You can deploy it however you want, on-prem, in your own cloud, or as a managed service, and it supports a <b>bring-your-own LLM</b> approach. I expect more platforms will need to support that as enterprises roll out their own internal models.</p><p class="paragraph" style="text-align:left;">Second, Crogl takes a pragmatic view of data. Instead of forcing you to normalize everything up front, the platform builds a <b>knowledge graph</b> that maps fields and entities across multiple data sources (SIEM, Data Lake, EDR, S3, Log Analytics, etc.). This means analysts can pivot investigations across fragmented environments without waiting for rigid schemas to be enforced.</p><p class="paragraph" style="text-align:left;">Third, response plans in Crogl aren’t static playbooks that break the moment something changes. They’re transparent, customizable, and designed to evolve as analysts take new actions. This gives teams both consistency and flexibility, a balance many AI SOC platforms struggle to get right.</p><p class="paragraph" style="text-align:left;">On investigations, Crogl doesn’t chase the “speed at all costs” narrative. Instead, the focus is on <b>depth, consistency, and repeatability</b>. Queries run as fast as your SIEM or data lake allows, but the system is designed to take the right investigative paths, verify results, and produce outcomes you can defend.</p><p class="paragraph" style="text-align:left;">Finally, Crogl closes the loop with feedback. Analyst decisions feed back into the system, updating response plans and strengthening the knowledge graph. Over time, this builds a living model of how your team actually investigates and responds, rather than locking you into a static black box.</p><p class="paragraph" style="text-align:left;">In short: Crogl is positioning itself as an <b>investigation-first AI SOC platform</b>. It’s enterprise-ready, analyst-friendly, and clearly built around the realities of fragmented data, complex processes, and the need for governance.</p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/blog-sponsorship?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-core-component"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=b9873410-e2be-42d3-abfe-390c6a92326e&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>AI SOCs You Can Actually Control and Customize</title>
  <description>Uncover the truth about AI SOC implementations: Learn how to control, customize, and trust your security automation with insights from real-world experience.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3fab17a8-80d2-4b4a-a05c-19d8e173c4d3/SecOps_Platform_Capabilities.png" length="303402" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/ai-socs-you-can-actually-control-and-customize</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/ai-socs-you-can-actually-control-and-customize</guid>
  <pubDate>Tue, 16 Sep 2025 13:15:00 +0000</pubDate>
  <atom:published>2025-09-16T13:15:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">I’ve been going over a bunch of AI SOC implementations lately, and something hit me: control. It’s not just about having an “autonomous” system that investigates alerts. It’s about being able to see <i>why</i> it took a certain path, adjust the logic, and align it with your own environment. Without that, you end up with a black box that you can’t fully trust. </p><p class="paragraph" style="text-align:left;">This isn’t just theory. In almost every SOC I’ve worked with or advised, I’ve seen how fragile it becomes when you either (a) rely fully on vendor defaults, or (b) build out hundreds of breakable playbooks by hand. Both lead to pain in different ways.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#0f3c71;"><b>D3 Morpheus</b></span></p><div class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><div class="image"><a class="image__link" href="https://d3security.com/morpheus/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize" rel="noopener" target="_blank"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e3e82084-79fb-4a4f-9bbe-2989edda6a3d/d3_logo_Black__1_.png?t=1757403141"/></a></div><p class="paragraph" style="text-align:left;"></p></td><td width="33%" class="bh__column"><p class="paragraph" style="text-align:left;"></p></td></tr></table><h3 class="heading" style="text-align:center;"><b><a class="link" href="https://d3security.com/morpheus/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize" target="_blank" rel="noopener noreferrer nofollow">Thinking AI SOC? Think Morpheus</a></b></h3><p class="paragraph" style="text-align:center;">Thinking AI SOC? Think Morpheus.<br>Morpheus delivers autonomy + control.<br>Built for Enterprise SOCs and top-tier MSSP/MDR.</p><p class="paragraph" style="text-align:center;">▪️100% alert coverage<br>▪️ 95% alerts triaged in &lt;2 mins.<br>▪️ Playbooks: autonomously built, user-adaptable <br><br>24-7-365 autonomous investigations across any SOC stack, plus built-in case mgmt., IR flows, dashboards. 800+ integrations.<br><br>CISO/SOC/MSSP pros, we’d love to meet you.</p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="mapping-the-ai-soc-landscape"><b>Mapping the AI SOC Landscape</b></h1><p id="when-i-look-at-ai-soc-platforms-i-b" class="paragraph" style="text-align:left;">When I look at AI SOC platforms, I break them down into two ways.</p><p class="paragraph" style="text-align:left;"><b>First, on which stage of the incident lifecycle do they focus:</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Left</b> - the data side: pipelines, log processing, detection engineering.</p></li><li><p class="paragraph" style="text-align:left;"><b>Middle</b> - enrichment, triage, and investigations.</p></li><li><p class="paragraph" style="text-align:left;"><b>Right</b> -response, remediation, and the feedback loop.</p></li></ul><p class="paragraph" style="text-align:left;">Some vendors specialize in one stage. Others stretch across multiple, but rarely all three.</p><p class="paragraph" style="text-align:left;"><b>Second, by implementation style:</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Plug-and-Play</b> -quick to deploy, usually centered on the middle (triage, investigations). You connect data sources, and it starts producing outcomes with minimal setup.</p></li><li><p class="paragraph" style="text-align:left;"><b>Build-and-Customize</b> -more like next-gen security automation platforms. These let you create workflows from scratch, wire them to alerts, or even run “headless” background automations. They usually cover the middle and right, sometimes the left as well.</p></li></ul><p class="paragraph" style="text-align:left;">Over the last 2–3 years, most new AI SOC startups have landed in the middle with plug-and-play products. Security automation platforms lean toward build-and-customize.</p><p class="paragraph" style="text-align:left;">Both approaches have tradeoffs, and understanding them is key.</p><div class="image"><a class="image__link" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1e6173e9-2bf4-4cfd-ab97-d53d1debd9fa/The_SecOps_AI_Shift_Map.png?t=1757402092"/></a></div><h1 class="heading" style="text-align:left;" id="the-buildand-customize-trap"><b>The “Build-and-Customize” Trap</b></h1><p class="paragraph" style="text-align:left;">Build-and-customize platforms feel like classic real-time strategy games. You start with nothing and design everything yourself: the integrations, the escalation logic, the deterministic flows. You’re in charge.</p><p class="paragraph" style="text-align:left;">That control is great, but it also means <b>you own the complexity</b>.</p><p class="paragraph" style="text-align:left;">Here’s the trap: deterministic automation doesn’t scale well if you try to build one workflow for every single detection use case. In one SOC I worked with, the team had over 200 automations, each tied to a specific detection. The result? They needed more engineers than analysts just to keep workflows alive. Every time an API changed, a field was renamed, or a vendor shifted its schema, half the playbooks broke.</p><p class="paragraph" style="text-align:left;">So while this model is powerful, it quickly becomes breakable. It works well if you’re building “macro” workflows (like log ingestion or enrichment pipelines). But if you try to encode every micro-decision into a deterministic playbook, you end up with a maintenance nightmare.</p><div class="image"><a class="image__link" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/3fab17a8-80d2-4b4a-a05c-19d8e173c4d3/SecOps_Platform_Capabilities.png?t=1758018027"/></a></div><h2 class="heading" style="text-align:left;" id="the-plugand-play-black-box"><b>The “Plug-and-Play” Black Box</b></h2><p class="paragraph" style="text-align:left;">Plug-and-play AI SOCs are the opposite. Think of them as strategy RPGs: the world is pre-built, the rules are set, and you just play the role you’re given.</p><p class="paragraph" style="text-align:left;">The upside is obvious: fast time-to-value. You connect your SIEM or log sources, and suddenly the platform is triaging, clustering, or even investigating alerts for you. For many orgs that are short-staffed, that’s appealing.</p><p class="paragraph" style="text-align:left;">The downside is just as obvious: no visibility into <i>how</i> the logic works, and no way to adjust it.</p><ul><li><p class="paragraph" style="text-align:left;">What if the platform suppresses something you consider critical?</p></li><li><p class="paragraph" style="text-align:left;">What if its default enrichment path doesn’t fit your environment?</p></li><li><p class="paragraph" style="text-align:left;">What if you just want to add one custom validation step before remediation?</p></li></ul><p class="paragraph" style="text-align:left;">In most cases, you can’t. You’re locked into the vendor’s logic. And when your team doesn’t understand or can’t shape the process, trust in the tool drops fast.</p><h2 class="heading" style="text-align:left;" id="where-automation-already-works-well"><b>Where Automation Already Works Well</b></h2><p class="paragraph" style="text-align:left;">Before talking about hybrids, let’s ground this in where automation already delivers value. From my own experience, the biggest wins are on the left side of the lifecycle.</p><p class="paragraph" style="text-align:left;">Take log ingestion. Many SaaS tools don’t provide streaming log integrations. You either need to pull data via API or pay for a third-party connector. I’ve built automations that:</p><ul><li><p class="paragraph" style="text-align:left;">Fetch audit logs on a schedule,</p></li><li><p class="paragraph" style="text-align:left;">Parse and normalize them,</p></li><li><p class="paragraph" style="text-align:left;">Push them into S3 or another bucket,</p></li><li><p class="paragraph" style="text-align:left;">Then feed them to a SIEM in the format it expects.</p></li></ul><p class="paragraph" style="text-align:left;">The benefit is twofold: the SIEM gets data in a clean, expected schema, and you offload parsing/storage from the SIEM, which saves costs.</p><p class="paragraph" style="text-align:left;">In detection engineering, I’ve built workflows that enrich threat intel feeds, extract TTPs, and generate hypotheses for new detections. For example, if intel shows a threat actor shifting to a new initial access vector, the automation surfaces that and suggests where detection coverage may be missing.</p><p class="paragraph" style="text-align:left;">There are also operational automations:</p><ul><li><p class="paragraph" style="text-align:left;">Creating backlog tickets automatically when a false positive is reported.</p></li><li><p class="paragraph" style="text-align:left;">Triggering attack simulations when new detections are deployed.</p></li><li><p class="paragraph" style="text-align:left;">Sending requests to red teams to validate coverage through adversary emulation.</p></li></ul><p class="paragraph" style="text-align:left;">These aren’t glamorous, but they save huge amounts of manual effort.</p><h2 class="heading" style="text-align:left;" id="the-messy-middle"><b>The Messy Middle</b></h2><p class="paragraph" style="text-align:left;">The middle of the SOC lifecycle isn’t just “messy;” it’s where the real detective work happens. You’ve pulled in enrichment and gathered context, and now you need to connect the dots into a coherent incident story.</p><p class="paragraph" style="text-align:left;">This is harder than it looks. Evidence isn’t uniform. Sometimes you’re pulling infrastructure data and need to cross-check with change requests or asset management logs. Sometimes it’s endpoint behavior, where there is no clear baseline, users run all sorts of random processes on their machines, and you need to know what’s “normal” in <i>this</i> business context. Other times, you’re correlating identity data, asking whether a login pattern aligns with known behavior for that role, that region, or that application.</p><p class="paragraph" style="text-align:left;">In practice, analysts spend much of their time bouncing between SIEM queries, log sources, and business systems, running searches and pulling fragments of context. The challenge is less about gathering raw data and more about stitching it into a narrative that makes sense. That’s why the middle ground has historically been so fragile for automation; you can’t just script it once and call it done. The process changes with every environment, every investigation, every new clue.</p><p class="paragraph" style="text-align:left;">This is where AI could be transformative, if it helps analysts assemble evidence and propose connections, but still shows <i>why</i> it drew those links. Without that transparency, it’s just guessing in the dark.</p><h2 class="heading" style="text-align:left;" id="a-hybrid-model-autonomy-with-guardr"><b>A Hybrid Model: Autonomy with Guardrails</b></h2><p class="paragraph" style="text-align:left;">So instead of being stuck with a black-box tool or a maintenance nightmare, imagine something in the middle. A hybrid model is all about getting the best of both worlds: the speed and scale of AI automation, with the control and flexibility your team actually needs.</p><p class="paragraph" style="text-align:left;">Here’s how I see it working: Instead of coding every playbook by hand, you just drop an alert into the AI SOC platform. From there, it generates a full investigation workflow on the fly.</p><p class="paragraph" style="text-align:left;">But here&#39;s the key part, it&#39;s not a black box. You can see all the steps it plans to take, and you can fine-tune them as needed. You could even upload one of your existing runbooks from Confluence, and the platform would use it as a template to shape its automation logic.</p><p class="paragraph" style="text-align:left;">I like to think of it with a gaming analogy.</p><ul><li><p class="paragraph" style="text-align:left;"><b>The &quot;City-Builder&quot; Phase:</b> This is the build-and-customize part where you lay down the rules. You set up the integrations, define your critical assets, and build deterministic guardrails, like &quot;for any action on a domain controller, you <i>must</i> get human approval&quot;.</p></li><li><p class="paragraph" style="text-align:left;"><b>The &quot;RPG&quot; Phase:</b> This is where the autonomous AI agents operate within the world you just built. They can investigate alerts, enrich data, and even suggest remediation, but they always have to follow the rules and stay on the roads you created.</p></li></ul><p class="paragraph" style="text-align:left;">This approach combines the strengths of both copilots and fully autonomous agents. Key capabilities usually include:</p><p class="paragraph" style="text-align:left;"><b>Balanced Autonomy:</b> The system handles the routine, high-volume stuff on its own but knows when to stop and escalate tricky or high-impact decisions to a human analyst.</p><p class="paragraph" style="text-align:left;"><b>Flexible Exploration:</b> Your analysts aren&#39;t locked into a rigid workflow. They can pivot from the AI&#39;s automated findings and start asking their own questions in an interactive chat, letting them dig deeper whenever they need to.</p><p class="paragraph" style="text-align:left;"><b>Customizable Logic:</b> The AI&#39;s workflows can be tailored to fit your SOC’s specific needs, giving you a good balance between automated consistency and the flexibility to handle unique threats.</p><p class="paragraph" style="text-align:left;">Ultimately, this balance, autonomy with guardrails, is what will make AI SOCs something we can actually rely on. It gives you a system that can handle the massive scale of alerts while making sure a human is still in the driver&#39;s seat for the decisions that really matter.</p><h1 class="heading" style="text-align:left;" id="final-thoughts"><b>Final Thoughts</b></h1><p class="paragraph" style="text-align:left;">Look, at the end of the day, there&#39;s no magic answer here. It’s super important to figure out what fits your own environment. Both the plug-and-play and the build-it-yourself platforms have their place.</p><p class="paragraph" style="text-align:left;">If you&#39;re short on people and just need something running fast, a plug-and-play tool is tempting. But you&#39;re stuck in their world, using their logic, and it&#39;s basically a black box. On the other hand, if you have a big engineering team, maybe building everything from scratch sounds good. But I&#39;ve seen how that turns into a maintenance nightmare that costs a fortune to keep running.</p><p class="paragraph" style="text-align:left;">This is where the hybrid model has some serious advantages. It&#39;s way faster to deploy than trying to build everything custom from the ground up, since the core AI investigation logic is already there. The cost of maintenance is also a lot lower because you’re not trying to keep hundreds of automation playbooks alive. And you still get the flexibility to tweak the workflows and make sure the system operates in a way you can actually trust. You get the speed of AI without having to give up all the control.</p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: D3 Security</b></h2><p class="paragraph" style="text-align:left;">I recently had a demo of <a class="link" href="https://d3security.com/morpheus/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize" target="_blank" rel="noopener noreferrer nofollow"><b>D3 Security’s Morpheus AI</b></a>, and it stood out because it addresses the exact problem I’ve been discussing in this post: the need for autonomy with control.</p><p class="paragraph" style="text-align:left;">When you drop an alert into Morpheus, it doesn’t just respond; it builds a full investigation runbook on the fly. What makes this different is transparency and flexibility: you can see every step, modify the workflow, and even audit the logic. That’s a big shift from black-box AI tools that give you no visibility into how decisions are made.</p><p class="paragraph" style="text-align:left;">Morpheus can autonomously handle a large portion of Tier 1–3 tasks, triaging most alerts in under two minutes while integrating across more than 800 tools. It also provides the option to switch between fully autonomous execution and human-in-the-loop oversight. Every AI-generated workflow is visible as code, which means you can treat it like any other engineered artifact: you can version, test, and improve it. For analysts, the workspace is well thought out, with AI summaries, priority scoring, recommended actions, relationship analysis, and a dynamic incident/forensic timeline, plus many other widgets that can be used to customize the workspace. </p><p class="paragraph" style="text-align:left;">For me, this hits the hybrid sweet spot: AI that’s autonomous enough to scale, but customizable enough to trust. If you’re looking at AI SOC platforms and want both speed and transparency, D3’s Morpheus is definitely worth a closer look.</p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/blog-sponsorship?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-socs-you-can-actually-control-and-customize"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=d0e0cac9-b311-433b-94a5-82b02021e65e&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>AI SOC Shift Left and Shift Right!</title>
  <description>Introducing the AI SOC Shift Map</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1e6173e9-2bf4-4cfd-ab97-d53d1debd9fa/The_SecOps_AI_Shift_Map.png" length="305210" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/ai-soc-shift-left-and-shift-right</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/ai-soc-shift-left-and-shift-right</guid>
  <pubDate>Thu, 11 Sep 2025 12:44:06 +0000</pubDate>
  <atom:published>2025-09-11T12:44:06Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><div class="recommendation" id="5e13eba8-22eb-4092-b6ba-4cf3bcda2599"><figure class="recommendation__logo"><img src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/408875e4-f58a-4507-af61-d7070d5f384e/image.png?t=1753952351"/></figure><h3 class="recommendation__title"> Audio Version </h3><iframe src="https://audio.beehiiv.com?token=eyJhbGciOiJIUzI1NiJ9.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_dD0xNzUzOTUyMzUxXCIsXCJ0aXRsZVwiOlwiQXVkaW8gVmVyc2lvblwifSI.MN06OFlNyyFCg1CE6yJTo-3yDI9ULMgkfKauFcAgr5U" frameborder="0" width="100%" height="162" allow="encrypted-media"></iframe></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">I’ll take some responsibility here. Maybe I started this movement, maybe not, but I’ve definitely been pushing it for a while. So now I’ll give it a proper name and see if I get some credit for it. In the end, it’s not about who said it first. It’s about sharing knowledge and helping the community make sense of what’s happening.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">It&#39;s been a couple of years now since AI really started hitting the cyber field, especially in Security Operations. We started with AI copilots, then the focus moved to the sweet spot, investigations, and now we&#39;re seeing a push to &quot;shift left&quot; and &quot;shift right.&quot;</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">And if you’re wondering what I mean by shifting left or right in this context, let’s clear that up. Unlike the messy attempts of “shift left” in SDLC, here it’s simple: shifting left or right means asking </span><span style="color:rgb(14, 16, 26);"><b>which stage of the IR cycle you are applying AI to</b></span><span style="color:rgb(14, 16, 26);">. For me, that’s the best way to evaluate, identify, and understand AI’s true capabilities for SecOps.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">So let’s give this framework a name: </span><span style="color:rgb(14, 16, 26);"><b>The SecOps AI Shift Map.</b></span></p><div class="image"><a class="image__link" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/d2e96f53-f3a8-4b08-a0b2-4d5f7505192c/The_SecOps_AI_Shift_Map_Detailed.gif?t=1757402283"/></a></div><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#0f3c71;"><b>Exaforce</b></span></p><div class="section" style="background-color:transparent;border-color:#222222;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f825e8ea-1824-4536-bf01-a45ab5d7e620/logo_exaforce.png?t=1757583282"/></div><p class="paragraph" style="text-align:center;"><b>From Zero to AI-Driven SOC</b></p><p class="paragraph" style="text-align:center;">Exaforce is a breakthrough AI SOC platform that infuses AI into every stage of your SOC lifecycle, across detection, triage, investigation, and response. We help you reduce your manual effort and improve your outcomes, while driving down costs. To learn how Exaforce is helping organizations like yours, <a class="link" href="https://www.exaforce.com/request-a-demo?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" target="_blank" rel="noopener noreferrer nofollow">book a call</a> with us or join the <a class="link" href="https://www.exaforce.com/event/from-zero-to-ai-driven-soc-how-to-transform-detection-triage-investigation-and-response-with-exaforce?utm_source=fs-newsletter&utm_medium=email&utm_campaign=webinar_ai_soc_sept2025" target="_blank" rel="noopener noreferrer nofollow">upcoming webinar</a>.</p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="shift-left-the-land-of-detections-a">Shift Left: The Land of Detections and Data</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">If you break down the IR cycle into three stages, left, middle, and right, you can start mapping where AI is actually being used. On the left side, we have data ingestion, log processing, and detection engineering. Think of it as the foundation: we set up controls like EDR, network protection, IAM, cloud guardrails, email security, the usual stack. </span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Then comes logging. You centralize everything in a SIEM, prioritize sources, and slowly build toward the impossible dream of “100% visibility.” </span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">After that comes detection engineering: choosing the right log sources, building threat profiles, and designing detections based on expected TTPs. That’s the left side of the house, and it ends with a detection firing.</span></p><h1 class="heading" style="text-align:left;" id="the-middle-the-investigation-sweet-">The Middle: The Investigation Sweet Spot</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">The middle side is where things get interesting, and honestly, where most of the industry is today. Once a detection fires, you need procedures. Call them SOPs, runbooks, or playbooks, they all serve the same purpose: guiding what you need to look at. Here comes enrichment, and I know there are strong opinions on whether this should sit at the detection layer or the investigation layer. In reality, it depends. Some enrichments definitely make detections stronger, but many, like CTI lookups, alert similarity, correlation, or even tribal knowledge, make more sense during investigation.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Once enriched, the investigation starts. I like to map this stage to the 5Ws: Who, What, When, Where, and Why. Answering those questions leads you to a conclusion, a verdict.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">We have a few types of verdicts:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);"><b>True Positive:</b></span><span style="color:rgb(14, 16, 26);"> This is malicious; we have a compromise or an issue that needs to be fixed.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);"><b>Benign (False Positive):</b></span><span style="color:rgb(14, 16, 26);"> This alert shouldn&#39;t have triggered, and the detection needs to be fine-tuned.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);"><b>Benign (True Positive):</b></span><span style="color:rgb(14, 16, 26);"> The alert triggered as expected, and the activity was confirmed to be normal. (Technically, some folks call this a &quot;Benign True Positive&quot; since the alert </span><span style="color:rgb(14, 16, 26);"><i>did</i></span><span style="color:rgb(14, 16, 26);"> fire correctly, but the point is the same: the activity was expected and not a threat.)</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Note that we are measuring metrics on alerts here, not incidents. Incidents are a different bucket. They can start directly in the investigation phase without an alert, and that’s where we might find a </span><span style="color:rgb(14, 16, 26);"><b>False Negative, </b></span><span style="color:rgb(14, 16, 26);">no alert was generated, but someone (an employee or an external party) identified a compromise.</span></p><h1 class="heading" style="text-align:left;" id="shift-right-remediation-recovery-an">Shift Right: Remediation, Recovery, and Broken Feedback Loops</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">And now for the right side of the house. This is where remediation, recovery, and lessons learned happen. It’s also the hardest part to automate or apply a lot of AI to, especially remediation.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">You’ll hear many people say this is where SOAR failed. I’d say no, it didn’t, </span><span style="color:rgb(14, 16, 26);"><i>we</i></span><span style="color:rgb(14, 16, 26);"> failed here because our processes are a mess. True automation hits a wall when it runs into a lack of API coverage for critical internal tools, undocumented tribal knowledge, a culture of risk aversion, and of course, the dreaded change management process. Remediation isn&#39;t always straightforward. The larger and more regulated the organization, the more you run into these roadblocks. You can’t just go wild and do what you want. No one wants to give a service account to a SOAR or AI SOC solution that has full write access. Even if some actions are pre-approved, the risk is just too high.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">The idea is that you don&#39;t have many compromises, so you shouldn&#39;t need to run these actions often. This beats the purpose of building automations that run only a few times a year. (And if you&#39;re an org that needs to run these actions often, I think you should go back to the left side and fix your issues there).</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Recovery is a bit easier to automate, and this is where IT and DevOps automation usually comes into play. And lessons learned? This is where AI shines. It’s great at writing a summary, getting you an executive report, and formatting it nicely. The part we need to improve is how we feed this information all the way back to the left side to constantly get better. We’re not doing a great job there. Where we fall short is feeding those lessons back to the left side to improve detections and logging. And let’s be honest: for many vendors, fewer problems don’t translate into revenue, so the feedback loop rarely gets prioritized.</span></p><h2 class="heading" style="text-align:left;" id="so-why-did-everyone-start-in-the-mi">So, Why Did Everyone Start in the Middle? (The Cake Analogy)</h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">When AI for SecOps first showed up, vendors went straight for the middle, the investigation. It’s like getting a fancy cake. You ignore the heavy fondant on the outside (the broken detections) and go for the sweet, sugary center. It gives you a quick sugar rush (hundreds of alerts closed fast!), and you feel great.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">(Weird analogy, I know).</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">But you&#39;re not fixing the real problems. The fondant still tastes bad, and the sugar crash is coming. The &quot;lessons learned&quot; are that you ate too much cake, but a week later, you forget and just remember the sweet part. You want that good feeling of eating the sweet middle part (all those 100 alerts closed fast).</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">So yeah, a long way of saying it started in the middle because it was the easiest part. It&#39;s the main area where we don&#39;t need as many deterministic things, and we can easily use GenAI to do analysis and come up with a verdict.</span></p><div class="image"><a class="image__link" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1e6173e9-2bf4-4cfd-ab97-d53d1debd9fa/The_SecOps_AI_Shift_Map.png?t=1757402092"/></a></div><h1 class="heading" style="text-align:left;" id="beyond-the-investigation-fixing-the"><span style="color:rgb(14, 16, 26);"><b>Beyond the Investigation: Fixing the Whole Problem</b></span></h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">But now we&#39;re realizing that just doing the investigation isn&#39;t enough. What about our broken or incomplete detections? What about the log sources that are missing key logs? What about the simple response actions?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">That&#39;s what we need to actually fix the problem. I want to get recommendations on which detections should be fixed and which log sources should be improved. I want my AI to be able to reach out to a user and ask for more information if needed, and then quarantine their machine and reset their password. </span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Simple, right?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Sad story is, not many are doing it yet.</span></p><h1 class="heading" style="text-align:left;" id="final-thoughts">Final Thoughts</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">The SecOps AI Shift Map is a way to frame where AI is being applied across the IR cycle. It helps us evaluate vendors, set expectations, and identify gaps.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">We started in the middle, because it was easy and satisfying. But the real progress ,the real SOC of the future ,is in shifting left and right. That’s how we’ll build AI SOCs that don’t just close alerts faster, but actually make security operations stronger end to end.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Just before I jump to the vendor spotlight, I wanted to reassure you, the audience: all the vendors I mention here are ones I&#39;ve had a demo with to understand their capabilities. It’s not just for the sake of having a vendor highlight; it&#39;s something I&#39;ve seen and evaluated, and I&#39;m giving you my insight on what they&#39;re good at.</span></p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: </b><span style="color:#0f3c71;"><b>Exaforce</b></span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Few AI SOC vendors are taking this broader approach today. </span><a class="link" href="https://exaforce.com?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" target="_blank" rel="noopener noreferrer nofollow">Exaforce</a><span style="color:rgb(14, 16, 26);"> is one of them. They aren’t stuck only in the triage investigation layer; they push AI left into detection and right into response. If that’s the type of capability you’re looking for, I’d recommend giving them a look. Better yet, get a demo. And if you see it differently, tell me. I want to hear other perspectives.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Exaforce isn’t content with just improving investigations. Built as a </span><span style="color:rgb(14, 16, 26);"><b>full-lifecycle, AI-native SOC platform</b></span><span style="color:rgb(14, 16, 26);">, it spans detection, triage, hunting, investigation, and response, and is available as </span><a class="link" href="https://www.exaforce.com/platform-overview?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" target="_blank" rel="noopener noreferrer nofollow">SaaS</a><span style="color:rgb(14, 16, 26);"> or a </span><a class="link" href="https://www.exaforce.com/mdr?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" target="_blank" rel="noopener noreferrer nofollow">fully managed MDR service</a><span style="color:rgb(14, 16, 26);">.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">At its core are </span><span style="color:rgb(14, 16, 26);"><b>Exabots</b></span><span style="color:rgb(14, 16, 26);">, agentic AI agents operating in autopilot or copilot mode to handle everything from alert enrichment to threat hunting. They layer deep learning, behavioral analytics, knowledge graphs, and LLMs to deliver human-grade reasoning across SOC workflows.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">Their </span><span style="color:rgb(14, 16, 26);"><b>Advanced Data Explorer</b></span><span style="color:rgb(14, 16, 26);"> unifies logs, identity, configuration, code context, and threat intelligence into a single canvas, queryable via natural language or a rich BI-style interface. No more jumping between tools.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(14, 16, 26);">If you’re looking for an </span><a class="link" href="https://www.exaforce.com/solutions/ai-for-soc?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right" target="_blank" rel="noopener noreferrer nofollow">AI SOC platform</a><span style="color:rgb(14, 16, 26);"> that goes well beyond the middle layer, extending left into detections and right into response, Exaforce deserves a serious look.</span></p><p class="paragraph" style="text-align:left;">For a live demo and deep dive into Exaforce, join the upcoming <a class="link" href="https://www.exaforce.com/event/from-zero-to-ai-driven-soc-how-to-transform-detection-triage-investigation-and-response-with-exaforce?utm_source=fs-newsletter&utm_medium=email&utm_campaign=webinar_ai_soc_sept2025" target="_blank" rel="noopener noreferrer nofollow">webinar</a>.</p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/blog-sponsorship?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=ai-soc-shift-left-and-shift-right"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=3b455d38-350f-4dcb-9e35-7df6208c143c&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Is Your AI SOC Optimistic or Pessimistic? </title>
  <description>Memory, Bias, and Drift in Real SOCs</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/55ae75c4-c55c-4b9a-aa8b-c155b8c4a0f1/AI_SOC_Model_Bias.gif" length="870118" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/is-your-ai-soc-optimistic-or-pessimistic-14264e1a9be330ff</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/is-your-ai-soc-optimistic-or-pessimistic-14264e1a9be330ff</guid>
  <pubDate>Thu, 21 Aug 2025 16:01:16 +0000</pubDate>
  <atom:published>2025-08-21T16:01:16Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Ai Soc]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">Memory makes GenAI useful in the SOC and also makes it opinionated. That opinion can drift. Some stacks become optimistic and default to benign. Others become pessimistic and default to malicious. Both are forms of bias. You can control this with explicit objectives, memory hygiene, calibration, and drift monitoring. Citations and a practical checklist are below.</p><h2 class="heading" style="text-align:left;">Table of Contents</h2><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#the-observation" rel="noopener noreferrer nofollow">The observation</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#where-the-bias-actually-comes-from" rel="noopener noreferrer nofollow">Where the bias actually comes from</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#monitoring-drift-in-ai-so-cs" rel="noopener noreferrer nofollow">Monitoring Drift in AI SOCs</a></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#population-stability-index-psi" rel="noopener noreferrer nofollow">Population Stability Index (PSI)</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#adwin-adaptive-windowing" rel="noopener noreferrer nofollow">ADWIN (Adaptive Windowing)</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#why-this-matters-in-practice" rel="noopener noreferrer nofollow">Why this matters in practice</a></p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#why-ai-soc-drift-is-different-from-" rel="noopener noreferrer nofollow">Why AI SOC Drift Is Different From Traditional Mod …</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#how-to-control-optimism-vs-pessimis" rel="noopener noreferrer nofollow">How to Control Optimism vs Pessimism on Purpose</a></p><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="#1-state-your-loss-function" rel="noopener noreferrer nofollow">1. State your loss function</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#2-separate-facts-from-verdicts-in-m" rel="noopener noreferrer nofollow">2. Separate facts from verdicts in memory</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#3-enforce-memory-hygiene" rel="noopener noreferrer nofollow">3. Enforce memory hygiene</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#4-use-structured-twopass-reasoning" rel="noopener noreferrer nofollow">4. Use structured, two-pass reasoning</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#5-calibrate-regularly" rel="noopener noreferrer nofollow">5. Calibrate regularly</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#6-monitor-drift-continuously" rel="noopener noreferrer nofollow">6. Monitor drift continuously</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#7-test-with-counterfactuals-and-red" rel="noopener noreferrer nofollow">7. Test with counterfactuals and red teams</a></p></li></ul></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#what-to-ask-your-vendor" rel="noopener noreferrer nofollow">What to ask your vendor</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#what-we-know-from-the-literature-an" rel="noopener noreferrer nofollow">What we know from the literature and industry</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#references" rel="noopener noreferrer nofollow">References</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="#closing-view" rel="noopener noreferrer nofollow">Closing view</a></p></li></ul><h1 class="heading" style="text-align:left;" id="the-observation"><b>The observation</b></h1><p class="paragraph" style="text-align:left;">In a clean world, AI investigations end in one of three outcomes: <b>benign, suspicious, or malicious</b>. In the field, once you add <b>memory</b>, the model starts anchoring to prior cases and narratives. Over time, I see two failure modes:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Optimistic drift</b>: the AI looks for evidence that activity is benign and closes too fast.</p></li><li><p class="paragraph" style="text-align:left;"><b>Pessimistic drift</b>: the AI assumes breach and marks too many items as malicious, flooding triage.</p></li></ul><p class="paragraph" style="text-align:left;">Both are biased patterns reinforced by memory. This is not “AI gone wrong.” It is a predictable effect of feedback, sampling, and incentives. Anchoring, confirmation, and availability biases show up in ML pipelines just as they do in humans.</p><p class="paragraph" style="text-align:left;"><b>My take:</b> I prefer a <b>pessimistic</b> default in security. Assume compromise and plan for worst case, then reduce noise with controls rather than miss a critical event.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>Do you enjoy CyberSec Automation Blog Content?</b></p><div class="embed"><a class="embed__url" href="https://www.sans.org/about/awards/difference-makers?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank"><div class="embed__content"><p class="embed__title"> Nominate for SANS Difference Makers Awards </p><p class="embed__description"> The SANS Difference Maker Awards are open for nominations, and I’d love your support. I’m applying in the Media Creator of the Year category for my work on CyberSec Automation. If you like the content I’ve been sharing, it would mean a lot if you could take a minute to nominate. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/04789914-2ea4-40c9-b7ca-9f6aaf2149f2/SANS-WEB_DMAs-Page-Hero_890_x_890.jpg?t=1755768139"/></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="where-the-bias-actually-comes-from"><b>Where the bias actually comes from</b></h1><ul><li><p class="paragraph" style="text-align:left;"><b>Anchoring via memory</b></p><p class="paragraph" style="text-align:left;">Retrieval of previous conclusions, tickets, and notes can anchor the model’s current reasoning. If memory stores verdicts, not only facts, you increase confirmation bias. NIST and ACM both call out bias as socio-technical, not just model-level.</p></li><li><p class="paragraph" style="text-align:left;"><b>Label/feedback loops</b></p><p class="paragraph" style="text-align:left;">If analysts reward “fast closes,” your reinforcement signal pushes optimism. If you reward “catch anything suspicious,” you push pessimism.</p></li><li><p class="paragraph" style="text-align:left;"><b>Dataset shift and model drift</b></p><p class="paragraph" style="text-align:left;">Your traffic, tools, and attacker mix change. That is <b>covariate shift</b> and <b>concept drift</b>. You must detect and respond to it. Practical detectors include PSI for distribution shift and streaming detectors like ADWIN.</p></li><li><p class="paragraph" style="text-align:left;"><b>Calibration decay</b></p><p class="paragraph" style="text-align:left;">Confidence scores stop matching reality as the environment changes. Track Expected Calibration Error and similar metrics to keep “probability of malicious” honest.</p></li><li><p class="paragraph" style="text-align:left;"><b>Domain specifics of cyber</b></p><p class="paragraph" style="text-align:left;">In cybersecurity, bias does not only waste time. It can either hide attacks (optimistic) or burn out analysts and suppress signal (pessimistic). Industry pieces echo this tension in practice.</p></li></ul><h1 class="heading" style="text-align:left;" id="monitoring-drift-in-ai-so-cs"><b>Monitoring Drift in AI SOCs</b></h1><p class="paragraph" style="text-align:left;">Two practical techniques you’ll hear about in ML Ops — and that are directly useful in AI SOC — are <b>PSI</b> and <b>ADWIN</b>. Both are ways of spotting when your model has started to “see the world differently” than it did at training or deployment time.</p><h2 class="heading" style="text-align:left;" id="population-stability-index-psi"><b>Population Stability Index (PSI)</b></h2><ul><li><p class="paragraph" style="text-align:left;">PSI is a simple way to measure whether the <i>distribution</i> of features (inputs the model uses) has shifted.</p></li><li><p class="paragraph" style="text-align:left;">For example: imagine your model relies heavily on <i>login geolocation</i> or <i>file hash rarity</i>. If the frequency distribution of those features changes a lot compared to your baseline (say, suddenly 30% of logins are from a new region), your model is now making predictions on data it hasn’t really been trained for.</p></li><li><p class="paragraph" style="text-align:left;">We typically set thresholds:</p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;"><b>PSI &lt; 0.1</b> → stable (no real change)</p></li><li><p class="paragraph" style="text-align:left;"><b>0.1–0.2</b> → moderate shift (keep an eye on it)</p></li><li><p class="paragraph" style="text-align:left;"><b>&gt;0.2</b> → warning level, drift may be affecting results</p></li><li><p class="paragraph" style="text-align:left;"><b>&gt;0.25</b> → action required (retrain or re-evaluate)</p></li></ul><p class="paragraph" style="text-align:left;"></p></li><li><p class="paragraph" style="text-align:left;">In the SOC, you’d use PSI on <b>high-value features</b> like source IP reputation scores, authentication method, or endpoint process ancestry — the signals that drive most of your verdicts.</p></li></ul><h2 class="heading" style="text-align:left;" id="adwin-adaptive-windowing"><b>ADWIN (Adaptive Windowing)</b></h2><ul><li><p class="paragraph" style="text-align:left;">ADWIN is a streaming drift detector. It looks at incoming telemetry in <i>real time</i> and detects if the statistical properties of the data have changed.</p></li><li><p class="paragraph" style="text-align:left;">Think of it as a moving window: if the recent data looks very different from the older data, ADWIN flags drift.</p></li><li><p class="paragraph" style="text-align:left;">Example in a SOC:</p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;">You’re monitoring <i>failed login attempts per user per hour</i>. Normally the distribution is steady. Suddenly, in the last hour, the rate jumps in a way that doesn’t fit past behavior. ADWIN detects this as a distribution change — signaling that the model’s prior assumptions may no longer hold.</p></li></ul></li><li><p class="paragraph" style="text-align:left;">ADWIN is valuable when your SOC ingests continuous, fast-changing data (auth logs, endpoint events, netflow).</p></li></ul><h2 class="heading" style="text-align:left;" id="why-this-matters-in-practice"><b>Why this matters in practice</b></h2><ul><li><p class="paragraph" style="text-align:left;">PSI tells you when your AI is drifting because the <i>population of data has shifted.</i></p></li><li><p class="paragraph" style="text-align:left;">ADWIN tells you when your AI is drifting because the <i>stream of data is behaving differently in real time.</i></p></li></ul><p class="paragraph" style="text-align:left;">Both should trigger <b>drift alerts</b> in your SOC platform. When thresholds are hit, you either retrain the model, adjust decision thresholds, or at least shadow-test the model to confirm it’s still making reliable calls.</p><h1 class="heading" style="text-align:left;" id="why-ai-soc-drift-is-different-from-"><b>Why AI SOC Drift Is Different From Traditional Model Drift</b></h1><p class="paragraph" style="text-align:left;">There’s something specific to cybersecurity worth calling out.</p><p class="paragraph" style="text-align:left;">When you roll out an AI SOC platform, you’ll either:</p><ul><li><p class="paragraph" style="text-align:left;">Feed it <b>historical data</b> (if the platform supports it), or</p></li><li><p class="paragraph" style="text-align:left;">Let it start fresh, learning in <b>shadow mode</b> from day one of deployment.</p></li></ul><p class="paragraph" style="text-align:left;">In the traditional SOC workflow, when a <b>human analyst</b> processes an alert, the output is often a one-liner:</p><ul><li><p class="paragraph" style="text-align:left;"><i>“False positive because xyz.”</i></p></li><li><p class="paragraph" style="text-align:left;"><i>“Normal activity, change request attached.”</i></p></li></ul><p class="paragraph" style="text-align:left;">That limited context doesn’t feed the model much bias. It tells the system how the case ended but doesn’t provide a lot of rich narrative that can anchor future decisions.</p><p class="paragraph" style="text-align:left;">But with <b>AI handling investigations</b>, the story changes. Instead of one-liners, you get one, two, sometimes three paragraphs of reasoning explaining why an alert was closed as benign, suspicious, or malicious.</p><p class="paragraph" style="text-align:left;">And here’s the kicker: most AI SOC platforms are built so that analysts <b>approve or deny</b> those AI conclusions. That means the model isn’t just learning the verdict — it’s learning from the <i>entire summary and narrative it generated.</i></p><p class="paragraph" style="text-align:left;">The result?</p><ul><li><p class="paragraph" style="text-align:left;">The more alerts you approve with “benign” narratives, the more the model drifts <b>optimistic.</b></p></li><li><p class="paragraph" style="text-align:left;">The more you approve “malicious” narratives, the more it drifts <b>pessimistic.</b></p></li><li><p class="paragraph" style="text-align:left;">And beyond optimism/pessimism, the model starts encoding other forms of bias hidden in the text — anchoring to particular arguments, data sources, or analyst preferences.</p></li></ul><p class="paragraph" style="text-align:left;">This makes AI SOC drift qualitatively different from classical ML drift. You’re not just feeding it labels. You’re feeding it <b>reinforced narratives</b> — which are far more context-rich and far more prone to anchoring.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/f9787b51-8560-4bf3-b1dd-ac7580b7efcc/AI_Bias_3.png?t=1755768248"/></div><h1 class="heading" style="text-align:left;" id="how-to-control-optimism-vs-pessimis"><b>How to Control Optimism vs Pessimism on Purpose</b></h1><h3 class="heading" style="text-align:left;" id="1-state-your-loss-function"><b>1. State your loss function</b></h3><p class="paragraph" style="text-align:left;">Every SOC has to decide which mistake is more costly:</p><ul><li><p class="paragraph" style="text-align:left;"><b>False Negative (FN)</b> → Missing an intrusion.</p></li><li><p class="paragraph" style="text-align:left;"><b>False Positive (FP)</b> → Investigating noise.</p></li></ul><p class="paragraph" style="text-align:left;">In most environments, <b>FN &gt; FP</b> — a breach is worse than wasted cycles. But not all teams weigh it the same:</p><ul><li><p class="paragraph" style="text-align:left;">A resource-constrained SOC may set stricter limits on FPs to avoid burnout.</p></li><li><p class="paragraph" style="text-align:left;">A high-risk sector (finance, healthcare) will tolerate more noise to minimize missed threats.</p></li></ul><p class="paragraph" style="text-align:left;">The key is to <b>make this explicit</b>. Don’t let the model’s default bias define your risk appetite. Encode the loss function into:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Thresholds:</b> e.g., “AI must be 85% confident to close as benign, but only 60% confident to escalate as malicious.”</p></li><li><p class="paragraph" style="text-align:left;"><b>Routing rules:</b> e.g., suspicious verdicts always go to Tier 1, but any <i>high-risk suspicious</i> (based on threat intel correlation) goes straight to IR.</p></li></ul><p class="paragraph" style="text-align:left;">Treat this as <b>SOC policy</b>, not a hidden “prompt hack.”</p><h3 class="heading" style="text-align:left;" id="2-separate-facts-from-verdicts-in-m"><b>2. Separate facts from verdicts in memory</b></h3><p class="paragraph" style="text-align:left;">One of the biggest sources of anchoring bias is how <b>memory retrieves past cases.</b></p><ul><li><p class="paragraph" style="text-align:left;">If the AI sees a verdict like <i>“benign – normal user behavior”</i> in memory, it may bias its current conclusion toward benign.</p></li><li><p class="paragraph" style="text-align:left;">If memory only retrieves <i>facts</i> (e.g., “User X logged in from IP Y at 03:00, MFA success”), the AI can evaluate evidence without inheriting the past verdict.</p></li></ul><p class="paragraph" style="text-align:left;">Practical controls:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Store artifacts, signals, and context</b> → log snippets, process trees, enrichment.</p></li><li><p class="paragraph" style="text-align:left;"><b>Down-weight final labels</b> → allow retrieval of verdicts, but apply less importance than raw evidence.</p></li><li><p class="paragraph" style="text-align:left;"><b>Force “evidence-first” prompts</b> → e.g., “Summarize the facts before giving a conclusion.”</p></li></ul><p class="paragraph" style="text-align:left;">This keeps memory as a <b>knowledge base</b>, not a verdict repeater.</p><h3 class="heading" style="text-align:left;" id="3-enforce-memory-hygiene"><b>3. Enforce memory hygiene</b></h3><p class="paragraph" style="text-align:left;">Think of memory like a SIEM data lake — garbage in, garbage out. Without hygiene, bias compounds.</p><ul><li><p class="paragraph" style="text-align:left;"><b>TTL (Time to Live):</b> Don’t let outdated conclusions anchor current cases. E.g., verdicts expire after 30 days unless reaffirmed.</p></li><li><p class="paragraph" style="text-align:left;"><b>Source tags & provenance:</b> Every memory chunk should record its origin — log type, analyst name, AI agent version. This makes retrieval explainable.</p></li><li><p class="paragraph" style="text-align:left;"><b>Retrieval filters:</b> Prefer multi-source evidence. For example, if two independent log sources (e.g., auth + EDR) align, rank that memory higher than a single noisy source.</p></li></ul><p class="paragraph" style="text-align:left;">This reduces toxic bias accumulation and prevents “zombie verdicts” from skewing current reasoning.</p><h3 class="heading" style="text-align:left;" id="4-use-structured-twopass-reasoning"><b>4. Use structured, two-pass reasoning</b></h3><p class="paragraph" style="text-align:left;">Humans avoid confirmation bias by debating, and AI needs the same. A two-pass system creates an internal “red team.”</p><ul><li><p class="paragraph" style="text-align:left;"><b>Pass A:</b> Build a case file of observations and hypotheses. E.g., <i>“Unusual PowerShell execution observed, correlated with new registry keys.”</i></p></li><li><p class="paragraph" style="text-align:left;"><b>Pass B:</b> Adversarial review. AI (or a secondary agent) argues the opposite verdict. E.g., <i>“This could also be normal IT admin activity — prior change tickets show similar actions.”</i></p></li></ul><p class="paragraph" style="text-align:left;">The final verdict must resolve both arguments. This mirrors human analyst workflows (peer review, escalation) and makes conclusions more balanced.</p><h3 class="heading" style="text-align:left;" id="5-calibrate-regularly"><b>5. Calibrate regularly</b></h3><p class="paragraph" style="text-align:left;">Raw confidence scores are almost always misleading. Calibration ensures “80% confidence” really means “8 out of 10 times correct.”</p><ul><li><p class="paragraph" style="text-align:left;"><b>Metrics:</b></p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;"><b>ECE (Expected Calibration Error):</b> measures mismatch between predicted vs actual accuracy.</p></li><li><p class="paragraph" style="text-align:left;"><b>Brier score:</b> penalizes both overconfidence and underconfidence.</p></li></ul><p class="paragraph" style="text-align:left;"></p></li><li><p class="paragraph" style="text-align:left;"><b>Operationalization:</b></p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;">Re-tune thresholds if calibration drifts.</p></li><li><p class="paragraph" style="text-align:left;">Publish a <b>monthly calibration report</b> to SOC leadership showing whether the AI’s confidence is still trustworthy.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;">Well-calibrated AI allows you to set rational escalation policies instead of “gut feel” thresholds.</p><h3 class="heading" style="text-align:left;" id="6-monitor-drift-continuously"><b>6. Monitor drift continuously</b></h3><p class="paragraph" style="text-align:left;">Data never stays static. Model drift is inevitable. The only question is whether you catch it.</p><ul><li><p class="paragraph" style="text-align:left;"><b>PSI (Population Stability Index):</b></p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;">Compares historical feature distributions vs live data.</p></li><li><p class="paragraph" style="text-align:left;">E.g., login location mix changes drastically.</p></li><li><p class="paragraph" style="text-align:left;">Thresholds: &gt;0.2 = warning, &gt;0.25 = action.</p></li></ul><p class="paragraph" style="text-align:left;"></p></li><li><p class="paragraph" style="text-align:left;"><b>ADWIN (Adaptive Windowing):</b></p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;">Monitors real-time streams for sudden changes.</p></li><li><p class="paragraph" style="text-align:left;">E.g., spike in failed logins per user compared to historical patterns.</p></li></ul><p class="paragraph" style="text-align:left;"></p></li><li><p class="paragraph" style="text-align:left;"><b>Response:</b></p><p class="paragraph" style="text-align:left;"></p><ul><li><p class="paragraph" style="text-align:left;">Trigger shadow evaluation, partial retraining, or force suspicious verdicts when drift is detected.</p></li><li><p class="paragraph" style="text-align:left;">Automate drift alerts into the SOC dashboard (same way we alert on log ingestion failures).</p></li></ul></li></ul><h3 class="heading" style="text-align:left;" id="7-test-with-counterfactuals-and-red"><b>7. Test with counterfactuals and red teams</b></h3><p class="paragraph" style="text-align:left;">SOC AI should be tested like detections: continuously and adversarially.</p><ul><li><p class="paragraph" style="text-align:left;"><b>Counterfactuals:</b> Hold out known attack scenarios and near-miss benigns. Evaluate AI weekly against this set.</p></li><li><p class="paragraph" style="text-align:left;"><b>Rotation:</b> Refresh test data monthly to avoid overfitting.</p></li><li><p class="paragraph" style="text-align:left;"><b>Red teaming:</b> Actively simulate edge cases — “what if MFA fails but user behavior is normal?” — to stress-test reasoning.</p></li></ul><p class="paragraph" style="text-align:left;">NIST AI RMF highlights this: continuous evaluation tied to <b>business harm</b>, not just technical accuracy.</p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/55ae75c4-c55c-4b9a-aa8b-c155b8c4a0f1/AI_SOC_Model_Bias.gif?t=1755790224"/></div><h1 class="heading" style="text-align:left;" id="what-to-ask-your-vendor"><b>What to ask your vendor</b></h1><ul><li><p class="paragraph" style="text-align:left;">How do you <b>prevent anchoring</b> from prior verdicts when using memory or case history?</p></li><li><p class="paragraph" style="text-align:left;">Do you provide <b>calibration reports</b> and can we export ECE or similar?</p></li><li><p class="paragraph" style="text-align:left;">What drift detectors are built-in (<b>PSI</b>, <b>ADWIN</b>, custom) and how are alerts surfaced?</p></li><li><p class="paragraph" style="text-align:left;">Can we <b>tune the loss function</b> or cost ratios for FN vs FP by use case?</p></li><li><p class="paragraph" style="text-align:left;">Do you support <b>two-agent review</b> or adversarial reasoning before final verdict?</p></li><li><p class="paragraph" style="text-align:left;">How do you <b>version</b> prompts, memories, and model configs so we can audit changes?</p></li><li><p class="paragraph" style="text-align:left;">Show us your approach aligned with <b>NIST AI RMF</b> controls for measurement and monitoring.</p></li></ul><h1 class="heading" style="text-align:left;" id="what-we-know-from-the-literature-an"><b>What we know from the literature and industry</b></h1><ul><li><p class="paragraph" style="text-align:left;">Bias can enter at data, model, and deployment stages. You must treat this as a socio-technical problem, not just tuning a model.</p></li><li><p class="paragraph" style="text-align:left;">Cybersecurity is already seeing bias outcomes that either hide threats or inflate noise. Leaders are concerned and are asking for measurable controls.</p></li><li><p class="paragraph" style="text-align:left;">Drift is normal in live systems. Use PSI for distribution monitoring and ADWIN for streaming change detection. Build playbooks that trigger re-evaluation when these fire.</p></li></ul><p class="paragraph" style="text-align:left;">Confidence must be calibrated if you expect analysts to trust scores. Track ECE and retrain or re-threshold when it degrades.</p><h1 class="heading" style="text-align:left;" id="references"><b>References</b></h1><ul><li><p class="paragraph" style="text-align:left;">ACM: <i>Biases in AI Systems</i></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://cacm.acm.org/practice/biases-in-ai-systems/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://cacm.acm.org/practice/biases-in-ai-systems/</a></p></li><li><p class="paragraph" style="text-align:left;">Interface Media: <i>Exploring the Impact of AI Bias on Cybersecurity</i></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://interface.media/blog/2024/12/24/exploring-the-impact-of-ai-bias-on-cybersecurity/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://interface.media/blog/2024/12/24/exploring-the-impact-of-ai-bias-on-cybersecurity/</a></p></li><li><p class="paragraph" style="text-align:left;">Chief Executive: <i>Why AI Bias Is a Growing Cybersecurity Concern</i></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://chiefexecutive.net/why-ai-bias-is-a-growing-cybersecurity-concern/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://chiefexecutive.net/why-ai-bias-is-a-growing-cybersecurity-concern/</a></p></li><li><p class="paragraph" style="text-align:left;">NIST AI Risk Management Framework (AI RMF 1.0)</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf</a></p></li><li><p class="paragraph" style="text-align:left;"><i>Concept Drift Detection in Data Streams</i> (ADWIN, Gama et al.)</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://homes.di.unimi.it/~cesabian/Pubblicazioni/mlj10.pdf?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://homes.di.unimi.it/~cesabian/Pubblicazioni/mlj10.pdf</a></p></li><li><p class="paragraph" style="text-align:left;"><i>Measuring Calibration in Deep Learning</i> (Guo et al., 2017)</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://arxiv.org/abs/1706.04599?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://arxiv.org/abs/1706.04599</a></p></li><li><p class="paragraph" style="text-align:left;"><i>Population Stability Index (PSI) for Monitoring Model Drift</i> (Practical Guide)</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://docs.snowflake.com/en/user-guide/mlops-psi?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://docs.snowflake.com/en/user-guide/mlops-psi</a></p></li><li><p class="paragraph" style="text-align:left;">NIST: <i>Bias in Artificial Intelligence</i></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.nist.gov/news-events/news/2022/03/nist-study-evaluates-tools-mitigate-bias-artificial-intelligence?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic" target="_blank" rel="noopener noreferrer nofollow">https://www.nist.gov/news-events/news/2022/03/nist-study-evaluates-tools-mitigate-bias-artificial-intelligence</a></p><p class="paragraph" style="text-align:left;"></p></li></ul><h1 class="heading" style="text-align:left;" id="closing-view"><b>Closing view</b></h1><p class="paragraph" style="text-align:left;">I still prefer a <b>pessimistic</b> default in security. Assume breach. Pay the cost of extra triage while you mature memory, calibration, and drift controls. You can dial back noise with evidence requirements and better calibration. You cannot easily recover from a missed intrusion.</p><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=is-your-ai-soc-optimistic-or-pessimistic"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=1ef191ac-5113-4bc7-8d7b-992aef9501c2&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>The Monthly Debrief: CyberSec Automation Podcast Roundup</title>
  <description>Jul-Aug / 25</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/070775cd-eb52-4e2b-90a1-56c77c879638/Blue_and_Black_Podcast_Startup_Logo_.png" length="174541" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/the-monthly-debrief-cybersec-automation-podcast-roundup-ed181766ffb4c951</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/the-monthly-debrief-cybersec-automation-podcast-roundup-ed181766ffb4c951</guid>
  <pubDate>Wed, 13 Aug 2025 13:45:00 +0000</pubDate>
  <atom:published>2025-08-13T13:45:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Podcast]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">Here&#39;s another edition of the CyberSec Automation blog, and you&#39;re probably noticing it looks a little different. I recently launched the CyberSec Automation Interview Series / Podcast, and I wanted to share some of the recent episodes with you.</p><p class="paragraph" style="text-align:left;">In these sessions, I chat with founders of cybersecurity companies, especially in the SecOps space, and other practitioners. The idea is to have a casual, no-BS conversation about what&#39;s really happening in security automation. Events are streamed live on LinkedIn, and I&#39;ve also created a YouTube channel where you can catch up on past episodes. Go ahead and subscribe if you want to get notified about new ones.</p><p class="paragraph" style="text-align:left;">The episodes are usually tied to a blog post, making it easier to follow the topic. Some are vendor-agnostic, while in others, founders explain how they&#39;re tackling a specific problem with their solution.</p><p class="paragraph" style="text-align:left;">This monthly edition of the blog will be all about the podcasts I host and the ones where I&#39;m a guest.</p><p class="paragraph" style="text-align:left;">Since this is the first one, here are the episodes and the related blogs.</p><hr class="content_break"><h2 class="heading" style="text-align:left;" id="when-does-it-make-sense-to-automate">When Does It Make Sense to Automate? When Does AI SOC Actually Work?</h2><p class="paragraph" style="text-align:left;">Join us for the next episode of the CyberSec Automation Interview Series!</p><p class="paragraph" style="text-align:left;">In this episode, I sit down with security pros <a class="link" href="https://www.linkedin.com/in/andrei-cotaie-3a3258b5/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Andrei Cotaie</a> and <a class="link" href="https://www.linkedin.com/in/cristianvmiron/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Cristian Miron</a> to tackle a big question in modern SOCs: when does it make sense to automate, and when should we trust AI in the SOC?</p><p class="paragraph" style="text-align:left;">We&#39;ll talk about the three main stages of the SOC workflow: detection and log ingestion, investigation, and response. We&#39;ll get into where automation provides the most bang for your buck, where AI SOC is starting to make a real impact, and where it’s still too early to rely on it.</p><p class="paragraph" style="text-align:left;">It&#39;s just a laid-back chat with real-world examples of how we&#39;re implementing and using AI SOC and automation.</p><p class="paragraph" style="text-align:left;">You can check out the upcoming event here: <a class="link" href="https://www.linkedin.com/events/whendoesitmakesensetoautomate-w7360612707361841152/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">https://www.linkedin.com/events/whendoesitmakesensetoautomate-w7360612707361841152/</a></p><p class="paragraph" style="text-align:left;">And the related blog post is here:</p><div class="embed"><a class="embed__url" href="https://www.cybersec-automation.com/p/why-soc-analysts-ignore-your-playbooks-72e6ec0f57d03b15?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank"><div class="embed__content"><p class="embed__title"> Why SOC Analysts Ignore Your Playbooks </p><p class="embed__description"> Uncover why SOC analysts resist traditional playbooks and learn how to create more effective, actionable security automation strategies that actually work. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/e780617b-8f1a-40db-83c2-4788694b5ae3/LEFT__MIDDLE_AND_RIGHT_SIDE_OF_THE_SECOPS_FLOW.png?t=1753949309"/></a></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="smashing-the-myth-of-the-single-pan">Smashing the Myth of the Single Pane of Glass</h2><p class="paragraph" style="text-align:left;">I sat down with <a class="link" href="https://www.linkedin.com/in/senadaruc/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Senad Aruc</a>, CEO of Imperum, to deconstruct the &quot;single pane of glass&quot; architecture.</p><p class="paragraph" style="text-align:left;">We got pretty technical, talking about why simple LLM wrappers don&#39;t work without native Threat Detection, Investigation, and Response (TDIR), the future of SIEM, how to deal with API limitations, and the kind of stack you need for a real Autonomous SOC.</p><p class="paragraph" style="text-align:left;">Watch the full episode here: </p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/DoPD2zuUt9o" width="100%"></iframe><p class="paragraph" style="text-align:left;">And here&#39;s the blog post that goes with it: </p><div class="embed"><a class="embed__url" href="https://www.cybersec-automation.com/p/stop-chasing-the-single-pane-of-glass-1555d42f940d3642?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank"><div class="embed__content"><p class="embed__title"> Stop Chasing the Single Pane of Glass </p><p class="embed__description"> Debunk the &quot;single pane of glass&quot; myth in cybersecurity: Explore why chasing unified platforms falls short and discover smarter approaches to security monitoring and response. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/5ac51c71-3bc9-46c8-811f-1a9a7f604129/SecOps_stack.gif?t=1753197693"/></a></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="building-ai-for-so-cs-that-analysts">Building AI for SOCs That Analysts Don’t Hate </h2><p class="paragraph" style="text-align:left;">In this episode, <a class="link" href="https://www.linkedin.com/in/tomfindling/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Tom Findling</a> from Conifers.ai joins me to talk about what it takes to build an AI-driven SOC platform that analysts actually want to use.</p><p class="paragraph" style="text-align:left;">We dive into the key features every AI SOC platform should have, best practices for implementation, and how to set realistic expectations from the get-go. No hype, just practical advice.</p><p class="paragraph" style="text-align:left;">Check out the conversation here:</p><iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture" allowfullscreen="true" class="youtube_embed" frameborder="0" height="100%" src="https://youtube.com/embed/uyZCaZw3LEY" width="100%"></iframe><p class="paragraph" style="text-align:left;"> The related blog is: </p><div class="embed"><a class="embed__url" href="https://www.cybersec-automation.com/p/automate-smarter-not-louder-using-interactive-ai-feedback-loops?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank"><div class="embed__content"><p class="embed__title"> Automate Smarter, Not Louder: Using Interactive AI Feedback Loops </p><p class="embed__description"> Revolutionize SecOps with AI-driven feedback loops: Learn how smart automation transforms threat intelligence, detection, and response strategies effectively. </p></div><img class="embed__image embed__image--right" src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/a11d0a12-3383-487e-8d84-66ceff246934/DSAEM_Loop.gif?t=1750837278"/></a></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="where-i-was-a-guest">Where I Was a Guest</h1><p class="paragraph" style="text-align:left;">I also had the chance to be a guest on a couple of other podcasts.</p><h3 class="heading" style="text-align:left;" id="ep-6-from-data-chaos-to-detection-e"><b>EP 6. From Data Chaos to Detection Engineering: How to Automate What Really Matters in the SOC</b></h3><p class="paragraph" style="text-align:left;">I joined <a class="link" href="https://www.linkedin.com/in/bal%C3%A1zs-scheidler-5055b73/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Balázs Scheidler</a> on the <b>Data Strikes Back</b> podcast to talk about a topic that&#39;s close to my heart: your SOC isn’t failing because of bad detections; it&#39;s failing because your data is a mess.</p><p class="paragraph" style="text-align:left;">We talked about:</p><ul><li><p class="paragraph" style="text-align:left;">How to use automation for more than just incident response, like in log management and data pipelines.</p></li><li><p class="paragraph" style="text-align:left;">Why &quot;detection as code&quot; is a waste of time without good schema discipline.</p></li><li><p class="paragraph" style="text-align:left;">How to handle massive amounts of legacy syslog data (we&#39;re talking 50TB/day) without blowing your SIEM budget.</p></li><li><p class="paragraph" style="text-align:left;">When it makes sense to standardize, transform, or just automate everything.</p></li></ul><p class="paragraph" style="text-align:left;">You can listen to it here: <a class="link" href="https://creators.spotify.com/pod/profile/ferenc-hernadi/episodes/EP-6--From-Data-Chaos-to-Detection-Engineering-How-to-Automate-What-Really-Matters-in-the-SOC---Filip-Stojkovski--Staff-Security-Engineer-and-author-of-the-CyberSec-Automation-blog-e36h6a3/a-ac3cm6h?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Data Strikes Back on Spotify</a> </p><h3 class="heading" style="text-align:left;" id="defender-fridays-by-lima-charlie"><b>Defender Fridays by LimaCharlie</b></h3><p class="paragraph" style="text-align:left;">I was also invited to join an episode of Defender Fridays by LimaCharlie. It was a great conversation about the current state of security automation and where things are headed.</p><p class="paragraph" style="text-align:left;">You can watch that here: <a class="link" href="https://limacharlie.io/defender-fridays?wchannelid=1ezi1lkgs2&wmediaid=6jtsmtuc1c&utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup" target="_blank" rel="noopener noreferrer nofollow">Defender Fridays</a></p><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=the-monthly-debrief-cybersec-automation-podcast-roundup"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=953b466d-e68c-466c-aed7-11b5babadce9&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Why SOC Analysts Ignore Your Playbooks</title>
  <description>Are Your SOC Playbooks Broken?</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/e780617b-8f1a-40db-83c2-4788694b5ae3/LEFT__MIDDLE_AND_RIGHT_SIDE_OF_THE_SECOPS_FLOW.png" length="417201" type="image/png"/>
  <link>https://www.cybersec-automation.com/p/why-soc-analysts-ignore-your-playbooks-72e6ec0f57d03b15</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/why-soc-analysts-ignore-your-playbooks-72e6ec0f57d03b15</guid>
  <pubDate>Thu, 31 Jul 2025 14:30:00 +0000</pubDate>
  <atom:published>2025-07-31T14:30:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Tech Stack]]></category>
    <category><![CDATA[Automation Playbooks]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="recommendation" id="076c9c88-a32d-4183-a8d9-c8c61a6a4c33"><figure class="recommendation__logo"><img src="https://beehiiv-images-production.s3.amazonaws.com/uploads/asset/file/408875e4-f58a-4507-af61-d7070d5f384e/image.png?t=1753952313"/></figure><h3 class="recommendation__title"> Audible version of the blog </h3><iframe src="https://audio.beehiiv.com?token=eyJhbGciOiJIUzI1NiJ9.IntcImJhY2tncm91bmRDb2xvclwiOlwiI0Y5RkFGQlwiLFwiYmFja2dyb3VuZFRoZW1lXCI6XCJsaWdodFwiLFwic3JjXCI6XCJodHRwczovL2JlZWhpaXYtcHVibGljYXRpb24tZmlsZXMuczMuYW1hem9uYXdzLmNvbS91cGxvYWRzL2Rvd25sb2FkYWJsZXMvNTU3OWJjMjUtODA5ZC00ZmQ2LWFhNzktMzNkYTNmZDEyNWMzLzA3NmM5Yzg4LWEzMmQtNDE4My1hOGQ5LWM4YzYxYTZhNGMzMy9XaHklMjBTT0MlMjBBbmFseXN0cyUyMElnbm9yZSUyMFlvdXIlMjBQbGF5Ym9va3Mud2F2P1gtQW16LUFsZ29yaXRobT1BV1M0LUhNQUMtU0hBMjU2XFx1MDAyNlgtQW16LUNyZWRlbnRpYWw9QUtJQVFDTUhUUVNFMkpHQUdYSEolMkYyMDI2MDMwNSUyRnVzLWVhc3QtMSUyRnMzJTJGYXdzNF9yZXF1ZXN0XFx1MDAyNlgtQW16LURhdGU9MjAyNjAzMDVUMTU0MTQxWlxcdTAwMjZYLUFtei1FeHBpcmVzPTYwNDgwMFxcdTAwMjZYLUFtei1TaWduZWRIZWFkZXJzPWhvc3RcXHUwMDI2WC1BbXotU2lnbmF0dXJlPWQ1YTY0YTZjMDc3N2MyNGI5ZTA3NTJjMzY2Njg2M2Y5ZWQ3N2JiNDllNGQ3ZDEzNWFiOTE0NDBjOGZlZWY1MjdcIixcInR5cGVcIjpcImF1ZGlvL3dhdlwiLFwidGh1bWJuYWlsVXJsXCI6XCJodHRwczovL2JlZWhpaXYtaW1hZ2VzLXByb2R1Y3Rpb24uczMuYW1hem9uYXdzLmNvbS91cGxvYWRzL2Fzc2V0L2ZpbGUvNDA4ODc1ZTQtZjU4YS00NTA3LWFmNjEtZDcwNzBkNWYzODRlL2ltYWdlLnBuZz90PTE3NTM5NTIzMTNcIixcInRpdGxlXCI6XCJBdWRpYmxlIHZlcnNpb24gb2YgdGhlIGJsb2dcIn0i.YQ-6dMfe5gjLGF7KS8mZ7-ogUKZcI5YcGv8LkC0dbzE" frameborder="0" width="100%" height="162" allow="encrypted-media"></iframe></div></div><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">The SOC playbook. It&#39;s been the backbone of security operations since cybersecurity became a thing. I started my career in this field 15 years ago, and honestly, not much has changed about the concept. A playbook is like a recipe; it&#39;s a simple idea that just works, and there&#39;s not a whole lot you can do to change the core concept. What </span><span style="color:rgb(27, 28, 29);"><i>has</i></span><span style="color:rgb(27, 28, 29);"> changed is how we interact with it.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Initially, it was just humans following the steps. Then, automation came along, and we started using SOAR platforms to automate bits and pieces of the playbook. Now, we have AI, and surprise, we&#39;re using it to write playbooks or have it follow the steps for us.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">The whole point of a playbook was to solve the &quot;</span><span style="color:rgb(27, 28, 29);"><b>tribal knowledge</b></span><span style="color:rgb(27, 28, 29);">&quot; problem. It&#39;s simple: document your processes so everyone is on the same page.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>But here’s the sad story: they are broken, and they have been since we started using them.</b></span></p><hr class="content_break"><div class="section" style="background-color:#F9FAFB;border-color:#222222;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><div class="image"><a class="image__link" href="https://www.legionsecurity.ai/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=why-soc-analysts-ignore-your-playbooks" rel="noopener" target="_blank"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/9c426504-26b2-4841-9a71-dc50afa35e8c/Legion.png?t=1753949147"/></a></div><p class="paragraph" style="text-align:center;"><span style="color:rgb(68, 71, 70);"><b>AI should think like your best SOC analyst, not someone else’s. Turn your team’s best instincts into AI-driven workflows without any integrations with Legion</b></span></p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="why-your-golden-standard-is-gatheri">Why Your &quot;Golden Standard&quot; is Gathering Dust</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Don&#39;t get me wrong, there are cases where playbooks work perfectly. In highly regulated environments, for instance, they have to be followed to the letter (which, in my view, is a fast track to analyst burnout). But in most SOCs? Not so much.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">From what I’ve seen, someone writes them, and they’re great for new joiners to understand how a specific organisation works. But are they followed consistently? Nope. Unless you have a deterministic automation platform that forces those exact steps, analysts tend to go off-script.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Experienced analysts, especially those who have been in the SecOps space for a while, usually go by instinct. If I asked you to pull the alerts from the past year, analyse the summaries, and check if the playbook steps were followed, you&#39;d find a huge percentage are outliers.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">And you might think, &quot;who cares, as long as the job gets done?&quot; Yeah, that&#39;s true. But I think this is the one loose brick in the SecOps tower that causes the butterfly effect, making everything else seem broken afterward. Now you&#39;re wondering, &quot;ok, this seems off.&quot;</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Let&#39;s break it down.</b></span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Why do we have too many unhandled alerts?</b></span><br><span style="color:rgb(27, 28, 29);">Because your feedback loop is broken. You don&#39;t have time for fine-tuning detections. And why is the feedback loop broken? Because that playbook step that says, &quot;every false positive needs to be sent back to detection engineering,&quot; is being ignored by everyone.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Why does your analyst retention rate suck?</b></span><br><span style="color:rgb(27, 28, 29);">Because they handle the same boring stuff over and over. They see the same alert, and their brain runs the same internal playbook instinctively. We have tools to automate this, but what about the edge cases? Do they follow a playbook for those, or do they just close another ticket as &quot;False Positive&quot; or &quot;Normal Activity&quot;? Probably the latter. This happens because they either don&#39;t follow the playbook, or the playbook hasn&#39;t been updated in so long it&#39;s irrelevant.</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">So yeah, I can go on, but I think many of the biggest problems in the SOC trace back to one thing: a broken playbook equals a broken process. It’s funny because of the classic PPT (People, Process, Technology) model, the process is almost always the thing that’s broken.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">You have the people and tech, but your process is a mess (most common).</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">You have people and processes, but your tech is garbage (happens sometimes).</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">You have tech and processes but no people (I haven&#39;t heard of this one, but who knows, maybe it&#39;s possible).</span></p></li></ul><h1 class="heading" style="text-align:left;" id="so-how-do-we-fix-this-mess">So, How Do We Fix This Mess?</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Ok, enough ranting. You came to this blog to hear about solutions. Can we fix it?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">I think yes. I was able to build and implement a framework that helps fix this. The main idea is to implement automation as much as possible, but you have to do it in a specific way.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Start on the left side: </span><span style="color:rgb(27, 28, 29);"><b>Data Ingestion</b></span><span style="color:rgb(27, 28, 29);"> and </span><span style="color:rgb(27, 28, 29);"><b>Detection Engineering</b></span><span style="color:rgb(27, 28, 29);">. This part is closely tied to threat hunting and threat intel, where your hypotheses and threat profiles begin. You know the basics: understand your environment, know what you need to defend, and know who you&#39;re defending it from. Build that basic structure of Assets and Identities—the key to good detections is having this context.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Once you have a new detection (after you evaluate, develop, and test it), you need to figure out what the playbook will be for it. This is the first breaking point for most teams. </span><span style="color:rgb(27, 28, 29);"><b>A detection without a playbook is one of the main causes of bad processes.</b></span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Here&#39;s a classic example: a new, scary threat emerges. You rush to develop a detection and throw it into production. The first week, everyone knows what it’s about. The first month, maybe. But then the alert goes quiet for a while. The analyst who wrote the detection leaves the company. A year later, you have this shadow detection that no one understands. Now it’s broken, spewing false positives like crazy, and the analysts are just closing them on autopilot.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">So yes, </span><span style="color:rgb(27, 28, 29);"><b>stop and build the damn playbook</b></span><span style="color:rgb(27, 28, 29);">. It&#39;s easier than ever. You can throw the alert context into a GenAI tool, and it will spit out a decent draft in seconds. You can even get fancy and embed this step into your detection engineering automation process.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Once you have the playbook, you have the foundation to explore which steps can be automated. Simple, right? Even if it&#39;s just one or two steps, it’s a win. That’s how you start. Eventually, you can get to full end-to-end automations. You can even script this whole thing (I’m working on an open-source project for this, but it’s going slow, so stay tuned... subscribe to the blog, because LinkedIn might not show you my posts).</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/cbafd6b0-7b68-4b88-a8ff-9fda074af73d/LEFT__MIDDLE_AND_RIGHT_SIDE_OF_THE_SECOPS_FLOW.gif?t=1753949482"/></div><h1 class="heading" style="text-align:left;" id="what-if-we-flipped-the-model">What if We Flipped the Model?</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Now imagine this. What if a tool took a different approach? What if you just let your analysts do their job, letting them go wild and investigate alerts however they see fit? And what if this tool just monitored their investigation in the background and built the playbook </span><span style="color:rgb(27, 28, 29);"><i>by itself</i></span><span style="color:rgb(27, 28, 29);">? Once it&#39;s done, the analyst could review it and turn it into an automation.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">You might be thinking, &quot;Filip, you just described an RPA solution.&quot; Yes, that&#39;s true. Sadly, no RPA solution has ever really worked for cybersecurity. The tech wasn&#39;t there, and the cyber environment is just too dynamic and unpredictable.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">But now we have AI and Agents. We can add an undeterministic approach to these automations when needed. This approach is worth exploring, and there are vendors already working on it (check out the vendor spotlight section).</span></p><h1 class="heading" style="text-align:left;" id="final-thoughts-stop-patching-start-">Final Thoughts: Stop Patching, Start Refactoring Your SOC</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">So, what&#39;s the big takeaway here? For years, we&#39;ve been trying to patch the SOC. We throw more tools at it, we hire more people, we buy more threat intel feeds. It feels like we&#39;re just adding more features to a pile of spaghetti code. The real problem is in the core logic—the playbooks.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Those analysts going by &quot;instinct&quot;? They&#39;re not breaking the rules. They&#39;ve just found a better, undocumented way to get the job done. They&#39;ve built a more efficient process in their heads because the official one is slow, clunky, or just plain wrong. The issue is that this knowledge walks out the door when they do.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">This is where that new approach I mentioned gets really interesting. Instead of forcing analysts to follow a rigid script, what if we had a system that could watch them work, learn their shortcuts, and turn that &quot;instinct&quot; into a documented, automated, and </span><span style="color:rgb(27, 28, 29);"><i>up-to-date</i></span><span style="color:rgb(27, 28, 29);"> playbook? This isn&#39;t about replacing the analyst. It&#39;s about cloning their expertise. It’s about building a process that adapts, instead of one that just gets old.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">At the end of the day, a broken playbook is a broken process. And a broken process means your people and your expensive tech are never going to work as well as they should. So maybe, just maybe, before you buy the next shiny AI tool that promises to solve all your problems, take a hard look at your playbooks. That&#39;s the bug that&#39;s been causing your whole system to crash.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/0b9431da-b3ec-4209-82ca-a40771bb50ed/Process_-_IR__Detection__Automation.gif?t=1718785598"/></div><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: </b><span style="color:#0f3c71;"><a class="link" href="https://www.legionsecurity.ai/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=why-soc-analysts-ignore-your-playbooks" target="_blank" rel="noopener noreferrer nofollow"><b>Legion Security</b></a></span></h2><p class="paragraph" style="text-align:left;">If AI can&#39;t learn how you work, you&#39;ll never trust it to work for you. Legion introduces a browser-based AI SOC companion that transforms your team’s expertise into scalable automation, eliminating the need for APIs, built-in playbooks, or integrations. </p><p class="paragraph" style="text-align:left;">Using a lightweight browser extension and AI vision models, Legion observes how your analysts work, capturing their decision-making processes, learning investigation patterns, and then automating them at your pace. It helps optimize workflows, operates 24/7 using your existing tools, and supports both autonomous and human-in-the-loop response. </p><p class="paragraph" style="text-align:left;">Designed to integrate instantly with any browser-accessible system, whether commercial platforms like SIEMs or homegrown tools, Legion’s AI SOC Analyst thinks like your team and reduces operational load without adding headcount. </p><p class="paragraph" style="text-align:left;">Turn your team’s best instincts into AI-driven workflows with Legion.</p><div class="embed"><a class="embed__url" href="https://www.legionsecurity.ai/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=why-soc-analysts-ignore-your-playbooks" target="_blank"><div class="embed__content"><p class="embed__title"> Legion Security | The Browser-Native AI SOC Analyst </p><p class="embed__description"> Legion Security is the first browser-native AI SOC Analyst that learns your team’s actual workflows and scales that knowledge across your organization. </p></div><img class="embed__image embed__image--right" src="https://cdn.prod.website-files.com/686e7e1928c1cbf8955ee16a/6889fa496b0b9878ee99712b_og.jpg"/></a></div></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/blog-sponsorship?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=why-soc-analysts-ignore-your-playbooks"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=why-soc-analysts-ignore-your-playbooks"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customise and utilise these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=why-soc-analysts-ignore-your-playbooks"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=fd2a54fb-de8e-4411-a205-f648c262cad3&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Stop Chasing the Single Pane of Glass</title>
  <description>Start Building It</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5ac51c71-3bc9-46c8-811f-1a9a7f604129/SecOps_stack.gif" length="186656" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/stop-chasing-the-single-pane-of-glass-1555d42f940d3642</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/stop-chasing-the-single-pane-of-glass-1555d42f940d3642</guid>
  <pubDate>Tue, 22 Jul 2025 17:02:00 +0000</pubDate>
  <atom:published>2025-07-22T17:02:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Tech Stack]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Since the times I started my career in cybersec, the &quot;single pane of glass&quot; has been one of those holy grails. You know the dream, the imaginable heaven for cyber where we have one platform that has all the alerts, all the context, and automation for the response. Everything is just a click away.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Picture it: You put on your VR glasses and swipe over investigation cards. Next to you is sitting our AI robot that does all the heavy lifting, and we just push the big red button to say &quot;malicious, crush it, burn it, later we will recover it.&quot; Okay, okay, I went too far with the imagination here. But yes, you get it. We all want a single pane of glass, and many vendors are trying to sell you one.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">But if you ask yourself, what actually is a single pane of glass? How does it look? What does it do?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">When I was at Adobe leading their Threat Intel and Threat Hunting programs, the CISO back then was Brad Arkin. He would ask me, &quot;Filip, if I give you an unlimited budget, what would you do with it? What tool would you spend it on and why?&quot; It was a good one. And I felt like I never had enough staff on my wish list. Why did I think that? Because I didn&#39;t know how to build the platform myself.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">So now, it made me think... if I can build one now, how would it look?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">And to be honest, I think there is no one solution that fits all. In my view, you need a solution that you can build on top of. Think of it like Legos, not a finished IKEA table. You need to build your own thing.</span></p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:rgb(15, 60, 113);"><b>Imperum</b></span></p><div class="section" style="background-color:#F9FAFB;border-color:#222222;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><div class="image"><img alt="" class="image__image" style="border-radius:0px 0px 0px 0px;border-style:solid;border-width:0px 0px 0px 0px;box-sizing:border-box;border-color:#E5E7EB;" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/1fad2197-6004-40bc-a3a2-d31c62ac0966/Screenshot_2025-07-23_at_14.30.20.png?t=1753270276"/></div><p class="paragraph" style="text-align:center;"><span style="font-size:1.5rem;"><b>Your SOC. Supercharged by AI</b></span><br><br><span style="color:rgb(0, 0, 0);font-family:"Calibri Light", "Helvetica Light", sans-serif;font-size:16px;">Imperum is the only AI-driven, autonomous SecOps platform that unifies detection, investigation, and response – cutting through alert fatigue, manual overhead, and integration barriers. As the only connector-agnostic solution on the market, Imperum delivers hyperautomation, built-in intelligence, and full-spectrum coverage — turning your stack into a true security powerhouse.</span><br><br><b>Heading to Black Hat? Swing by Booth #6218 or </b><b><a class="link" href="https://outlook.office.com/bookwithme/user/42340e6b7baf4b9e9c13830424a8947c%40imperum.io/meetingtype/fWSIbK_BsEiZrfr1fQsH7A2?bookingcode=bd5161a9-ddcb-459d-b672-db4973e15982&anonymous=&ismsaljsauthenabled=true&utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass" target="_blank" rel="noopener noreferrer nofollow" style="color: rgb(17, 85, 204)">book a meeting</a></b><b> to see what happens when AI goes all in</b></p></div><hr class="content_break"><h1 class="heading" style="text-align:left;" id="what-my-single-pane-of-glass-would-">What My &quot;Single Pane of Glass&quot; Would Track</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">So if I&#39;m building this platform, what do I actually want to see and do? For me, it boils down to a few key things.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5ac51c71-3bc9-46c8-811f-1a9a7f604129/SecOps_stack.gif?t=1753197693"/></div><h2 class="heading" style="text-align:left;" id="1-assets-machines-and-identities"><span style="color:rgb(27, 28, 29);">1.Assets: Machines and Identities</span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">First, I want to track my assets. And really, there are only two types of assets I care about: machines and identities.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">It helps to think of it like a classic fortress, you know? A bit old school, but it works.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">The fortress is your whole organization.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Machines</b></span><span style="color:rgb(27, 28, 29);"> are the houses and buildings inside the walls. They are the static things, the structures. Your servers, laptops, containers.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Identities</b></span><span style="color:rgb(27, 28, 29);"> are the people, the army, the livestock. They are the living things that move around and use the buildings. Your employees, service accounts, admins. They are the ones </span><span style="color:rgb(27, 28, 29);"><i>doing</i></span><span style="color:rgb(27, 28, 29);"> things.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">And the </span><span style="color:rgb(27, 28, 29);"><b>Network</b></span><span style="color:rgb(27, 28, 29);">? That’s just the roads connecting everything.</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">When you think like this, it gets simple. Everything bad that happens in your network happens to one of these two things. If you start here, everything else gets easier. Tagging every event with an </span><span style="color:rgb(87, 91, 95);">asset_id</span><span style="color:rgb(27, 28, 29);"> and a </span><span style="color:rgb(87, 91, 95);">user_id</span><span style="color:rgb(27, 28, 29);"> is the magic key.</span></p><h2 class="heading" style="text-align:left;" id="2-your-data-a-fast-brain-and-a-perf"><span style="color:rgb(27, 28, 29);">2.Your Data: A Fast Brain and a Perfect Memory</span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Let&#39;s be clear: your SIEM is the brain of your SOC. It’s where the magic happens—correlation, alerting, and hunting. But what happens when you try to force-feed it every single raw log from every tool you own?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">It gets slow. It gets expensive. And your analysts spend more time waiting for queries to finish than actually investigating threats.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">This is where a security data lake comes in. Think of it as a massive, cheap storage unit for all your security data—the good, the bad, and the ugly. You keep everything, but you don&#39;t force your SIEM to chew on it all at once.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">The trick is to put a smart pipeline in front of both. As data streams in, this pipeline does the dirty work first: it cleans up the data and tags it with a standard format.</span></p><div class="codeblock"><pre><code>&#123;
  &quot;asset_id&quot;: &quot;host-42&quot;,
  &quot;user_id&quot;: &quot;alice@corp.com&quot;,
  &quot;event_type&quot;: &quot;process_spawn&quot;,
  &quot;source&quot;: &quot;CrowdStrike_EDR&quot;,
  &quot;timestamp&quot;: &quot;2025-07-14T12:05:00Z&quot;,
  &quot;raw_payload&quot;: &#123; /*...original vendor log...*/ &#125;
&#125;
</code></pre></div><p id="the-result-your-siem-gets-clean-pre" class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">The result? Your SIEM gets clean, pre-tagged data that’s ready for real-time analysis. It stays fast and focused on finding bad guys but can still pull years of historical logs from the data lake whenever you need to dig deep for a hunt.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">You get the best of both worlds: a fast brain (your SIEM) and a perfect memory (your data lake).</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Or you can pick one of the next-gen SIEMs that can do all of this for you.</span></p><h2 class="heading" style="text-align:left;" id="3-context-the-enrichment-layer"><span style="color:rgb(27, 28, 29);">3.</span><span style="color:rgb(27, 28, 29);">Context: The Enrichment Layer</span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Raw alerts are just noise. So, the platform needs to get all the context.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>External Enrichment:</b></span><span style="color:rgb(27, 28, 29);"> This is your threat intel. Checking IPs, domains, and hashes against VirusTotal or other feeds.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Internal Enrichment:</b></span><span style="color:rgb(27, 28, 29);"> This is even more important. You need to connect to your own systems, like a CMDB to see who owns the machine, or IAM to see what the user&#39;s role is.</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">The best way is to build these as separate, small services. That way, your SOAR playbooks and your AI agents are calling the exact same enrichment tool. No more duplicate logic.</span></p><h2 class="heading" style="text-align:left;" id="4-the-correlation-layer"><span style="color:rgb(27, 28, 29);">4.</span><span style="color:rgb(27, 28, 29);">The Correlation Layer</span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Now that you have alerts and context, you need to connect them. I want to combine multiple detections from the same or different sources in one place. And I want to do that based on those two assets: machines and identities.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">For this, you need to mix old-school rules with new-school AI.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Rules:</b></span><span style="color:rgb(27, 28, 29);"> Handle the easy stuff. &quot;5 failed logins + 1 successful login from a new country = Impossible Travel.&quot; Simple.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>AI:</b></span><span style="color:rgb(27, 28, 29);"> After the rules run, let an AI model look at what&#39;s left. It can find weird connections that a human or a simple rule would miss.</span></p></li></ul><h2 class="heading" style="text-align:left;" id="5-response-actions-do-something-and"><span style="color:rgb(27, 28, 29);">5.Response Actions: Do Something and Track It</span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Okay, we have a correlated incident. Now what? I want to be able to do response actions from the same platform. And I need to track the outcomes.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Did that &quot;isolate host&quot; command actually work? Did the user account get disabled? You need a closed loop. The platform has to check and confirm that the action was completed.</span></p><h2 class="heading" style="text-align:left;" id="6-emulation-test-your-work"><span style="color:rgb(27, 28, 29);">6.Emulation: Test Your Work</span></h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">And if I can also emulate attacks from the same place, it&#39;s just perfect. You know the DASEM loop (Detect → Analyze → Simulate → Evaluate → Mitigate). Use a Breach and Attack Simulation (BAS) tool to run tests. See if your detections fire. This is how you find your blind spots before the bad guys do.</span></p><h2 class="heading" style="text-align:left;" id="the-hybrid-model-is-the-only-way">The Hybrid Model Is the Only Way</h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">To make all this work, you can&#39;t just rely on automation playbooks. And you can&#39;t just rely on AI. You need both.</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Rules and SOAR</b></span><span style="color:rgb(27, 28, 29);"> are for the predictable stuff. They are fast and dumb. Perfect for high-volume tasks you see every day.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>AI Agents</b></span><span style="color:rgb(27, 28, 29);"> are for the flexible, complex stuff. They can handle the &quot;what is this?&quot; questions that break traditional automation.</span></p></li></ul><h2 class="heading" style="text-align:left;" id="so-how-do-you-start">So, How Do You Start?</h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">This sounds big, I know. But you start small.</span></p><ol start="1"><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Pick one use case.</b></span><span style="color:rgb(27, 28, 29);"> Phishing triage is always a good one.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Build a simple playbook.</b></span><span style="color:rgb(27, 28, 29);"> Ingest the alert, enrich the IOCs, and create a ticket.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Add a small AI agent.</b></span><span style="color:rgb(27, 28, 29);"> Have it write a summary for the analyst.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Get feedback.</b></span><span style="color:rgb(27, 28, 29);"> Let the analyst rate the AI&#39;s summary. This is how it learns.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Track your metrics.</b></span><span style="color:rgb(27, 28, 29);"> Mean Time to Respond (MTTR). False positive rate. Analyst hours saved.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Iterate.</b></span><span style="color:rgb(27, 28, 29);"> Slowly make it better, then move to the next use case.</span></p></li></ol><h2 class="heading" style="text-align:left;" id="maximizing-your-investment-beyond-a">Maximizing Your Investment: Beyond API Limitations</h2><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Let&#39;s talk about a real-world problem. You buy into this &quot;Lego&quot; philosophy, you pick a great platform, but you hit a wall: APIs. Your platform is only as good as the tools it can talk to. What happens when a critical tool in your stack has a terrible API, or worse, no API at all?</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">This is where the true value of a platform is tested. A good platform doesn&#39;t just rely on pre-built connectors. It gives you the power to overcome these limitations. Look for capabilities like:</span></p><ul><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Custom Integration Builders:</b></span><span style="color:rgb(27, 28, 29);"> The ability to take any vendor&#39;s API documentation—no matter how weird—and build your own integration without waiting for the platform vendor to do it. This puts you in control.</span></p></li><li><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);"><b>Going Beyond APIs:</b></span><span style="color:rgb(27, 28, 29);"> Sometimes you need to interact with systems that don&#39;t have APIs. Think legacy systems or tools that only have a command-line interface (CLI). A truly flexible platform will let you deploy agents directly on those systems to run commands, parse text output, and feed that data back into your central hub. You&#39;re no longer limited by what the vendor supports out-of-the-box.</span></p></li></ul><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">And this brings up another point: speed. In cybersecurity, things change fast. You might discover you need a new feature or a new type of analysis. The question you should ask any vendor is: &quot;If I request a new feature today, how long until I see it?&quot; A vendor that is truly a partner will have a rapid development cycle, often driven directly by customer requests. If you have to wait six months for a new feature, the attackers have already moved on.</span></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/490ddfa8-4a70-4476-b1c0-edd6d4022fc1/SecOps_Architecture.jpg?t=1753197732"/></div><h1 class="heading" style="text-align:left;" id="final-thoughts">Final Thoughts</h1><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">At the end of the day, the &quot;single pane of glass&quot; isn&#39;t about finding the perfect tool. It&#39;s about changing your mindset. Stop looking for a magic box that will solve all your problems. It doesn&#39;t exist.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">Instead, focus on building a platform that gives you a unified view of your assets and a flexible way to correlate data, add context, and take action. It&#39;s a journey, not a destination. You start with one small piece, one Lego block, and you build from there. You measure, you iterate, and you slowly create a system that is tailored to your specific environment and your specific risks.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">That is the real single pane of glass. It&#39;s not a product you buy. It&#39;s a system you build.</span></p><p class="paragraph" style="text-align:left;"><span style="color:rgb(27, 28, 29);">This is the only way. You build it piece by piece, like Legos. That&#39;s how you get your real &quot;single pane of glass.&quot; Not a magic box, but a command center that you built, that you trust, and that actually works for you.</span></p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: </b><span style="color:#0f3c71;"><b>Imperum</b></span></h2><p class="paragraph" style="text-align:left;">It’s one thing to sketch out the architecture for a hybrid, AI-powered SOC; it’s another to find the right platform to build it on. While many tools handle one piece of the puzzle, few are designed from the ground up to be the flexible, API-driven foundation that this modern approach requires. This is where a platform like <a class="link" href="https://Imperum.io?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass" target="_blank" rel="noopener noreferrer nofollow">Imperum.io</a> comes into focus.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://Imperum.io?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass" target="_blank" rel="noopener noreferrer nofollow">Imperum.io</a> is engineered around the very &quot;Lego, not Ikea&quot; philosophy we&#39;ve been discussing. It’s not another monolithic tool promising to be your entire security stack. Instead, it serves as the central hub, the connective tissue, that allows you to build a true single pane of glass tailored to your environment.</p><p class="paragraph" style="text-align:left;">Here’s how <a class="link" href="https://Imperum.io?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass" target="_blank" rel="noopener noreferrer nofollow">Imperum.io</a> maps to the core pillars of our ideal platform:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Unified Ingestion and Asset-Centric Model:</b> At its core, Imperum is built to ingest data from virtually any source—your EDR, SIEM, cloud logs, and more. It automatically normalizes this data and, crucially, ties it to a unified model of your assets: both machines and identities. This immediately solves the foundational challenge of creating a single, pivotable view of your entire technology landscape.</p></li><li><p class="paragraph" style="text-align:left;"><b>Open and Flexible Integration:</b> This is where Imperum really shines. They tackle the API problem head-on. Their platform includes a no-code editor that lets you build your own integrations from any vendor&#39;s API documentation. This means you&#39;re not stuck waiting for them to add support for a niche tool. Even better, for legacy systems without APIs, you can deploy agents to interact directly via command-line, giving you a way to connect literally everything.</p></li><li><p class="paragraph" style="text-align:left;"><b>Hybrid Correlation and Response:</b> Imperum embraces the rules + AI model. It allows you to define rule-based logic for common, high-fidelity correlations while also leveraging more advanced analytics and AI to uncover complex threats that rules would miss. The response orchestration is equally flexible, enabling you to trigger automated playbooks in your SOAR or call custom scripts, all from a central case management interface.</p></li><li><p class="paragraph" style="text-align:left;"><b>A True Partner in Development:</b> Imperum operates with a rapid development cycle driven by customer needs. When you need a new feature, you&#39;re not putting a ticket into a black hole that you might hear back from in six months. They work with you to get it built and deployed quickly, because they understand that in security, speed is everything.</p></li></ul><p class="paragraph" style="text-align:left;">For organizations looking to escape the limitations of siloed tools and build a truly responsive, intelligent security operation, the key is to find a platform that empowers your team, not one that locks you into a rigid, one-size-fits-all approach. <a class="link" href="https://Imperum.io?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass" target="_blank" rel="noopener noreferrer nofollow">Imperum.io</a> is a prime example of a vendor providing the necessary building blocks ,and the partnership model, to construct the single pane of glass you actually need.</p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=stop-chasing-the-single-pane-of-glass"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=9ceea2e5-70a5-4452-90ca-20148180fdb9&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Automate Smarter, Not Louder: Using Interactive AI Feedback Loops</title>
  <description> DSAEM Loop (Detect &gt; SOP &gt; Automate &gt; Emulate &gt; Measure</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a11d0a12-3383-487e-8d84-66ceff246934/DSAEM_Loop.gif" length="260625" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/automate-smarter-not-louder-using-interactive-ai-feedback-loops</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/automate-smarter-not-louder-using-interactive-ai-feedback-loops</guid>
  <pubDate>Wed, 25 Jun 2025 17:04:00 +0000</pubDate>
  <atom:published>2025-06-25T17:04:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Framework]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">If you’ve been following my blog, you&#39;ve probably noticed I preach a lot about the feedback loop. I wanted to do a deep dive on why it&#39;s actually important, what we get out of it, and whether it&#39;s one of those things everyone talks about but nobody implements right.</p><p class="paragraph" style="text-align:left;">My first real go at a feedback loop in cybersecurity was back when I was building the LEAD framework for Threat Intelligence at Adobe. I started because most threat intel programs I saw had no feedback mechanism. The idea was simple: get some Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs), and throw them over the wall to the SecOps team for detection and investigation. End of story. The problem was, I needed metrics to prove the program was working. &quot;No hits based on IOCs&quot; is a terrible metric; I wanted more. I needed to understand if the intel was actually useful or just noise. And yeah, it took a year of hard work, but we got it implemented, and the results were awesome.</p><p class="paragraph" style="text-align:left;">Later, when I was running a SecOps engineering team, I figured, why not use the same logic for Detection Engineering and Automation? That’s how I came up with the framework mapping SANS IR stages to Detection Engineering, Standard Operating Procedures (SOPs), and Automation. After that, I created the <b>DSAEM Loop</b>, which breaks it down even further: <b>D</b>etection Engineering &gt; <b>S</b>tandard operating Procedures &gt; <b>A</b>utomation & Ai Agents &gt; Threat <b>E</b>mulation &gt; <b>M</b>etrics. It makes the whole thing even easier to grasp.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><a class="link" href="https://www.conifers.ai/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops" target="_blank" rel="noopener noreferrer nofollow"><b>Conifers AI</b></a></p><div class="section" style="background-color:#F9FAFB;border-color:#222222;border-style:solid;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"></p><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/ecbb94c5-230e-4e8a-8649-63c78521d1d7/Screenshot_2025-06-25_at_10.46.21.png?t=1750837606"/></div><p class="paragraph" style="text-align:center;"><span style="font-size:1.5rem;"><b>Achieve SOC excellence with the smart use of AI</b></span><br><br>Conifers is the AI SOC platform that delivers deep, contextual investigations, adapted to your own data, decisions, and risk tolerance. Continuously learning and adapting to scale your SOC effectiveness and efficiency, Conifers becomes a force multiplier for your team. <br><br>Going to Black Hat? Want to learn more? <a class="link" href="https://resources.conifers.ai/meetings/ashor/meet-at-black-hat-2025?uuid=19f0d4b4-6caf-495f-9b5d-fb955b811a65&utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops" target="_blank" rel="noopener noreferrer nofollow">Let’s meet!</a><br></p></div><hr class="content_break"><h3 class="heading" style="text-align:left;" id="why-bother-with-a-sec-ops-feedback-"><b>Why Bother With a SecOps Feedback Loop?</b></h3><p class="paragraph" style="text-align:left;">Okay, enough storytelling. Why is a well-implemented SecOps feedback loop so critical?</p><div class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;"> 📊<b>You can actually measure improvement</b></p><p class="paragraph" style="text-align:left;">Instead of just fighting fires and being stuck in an endless loop of alert triage, you can see if you&#39;re getting better.</p></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🕵🏻‍♂️ <b>For detection engineering</b></p><p class="paragraph" style="text-align:left;">You can see how your detections are performing. You know what needs to be improved, fine-tuned, or maybe just thrown in the bin.</p></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:transparent;border-color:#C0C0C0;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;"> 📑<b>For SOPs</b></p><p class="paragraph" style="text-align:left;">You can measure how effective your processes are. Are people actually following them, or do they need an update because they’re completely out of touch with reality?</p></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">⛮ <b>And for automation</b></p><p class="paragraph" style="text-align:left;">You can see which playbooks are actually being used. How much are they contributing? Are they adding real Full-Time Equivalent (FTE) value, or are they just sitting there, triggering once a month to save an analyst 10 minutes?</p></td></tr></table></div><div class="image"><a class="image__link" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops" rel="noopener" target="_blank"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/a11d0a12-3383-487e-8d84-66ceff246934/DSAEM_Loop.gif?t=1750837278"/></a></div><h2 class="heading" style="text-align:left;" id="breaking-down-the-process"><b>Breaking Down the Process</b></h2><p class="paragraph" style="text-align:left;">So, let’s break it down. What SecOps elements do we need to create this loop?</p><p class="paragraph" style="text-align:left;">It all starts with the <b>Preparation</b> phase. We build guardrails, put security controls in place, and monitor for threats to keep the bad guys out. First, we build a Threat Profile for our organization, understanding who might target us and what our &quot;crown jewels&quot; are. Once that&#39;s sorted, we start collecting logs, starting with our most critical assets and working our way down.</p><p class="paragraph" style="text-align:left;">Now for the interesting part: <b>Detection Engineering</b>. This is where we deploy all the detections we need. After that, the alerts go to the SOC team to build runbooks. Then it&#39;s back to the automation folks to see what steps can be automated.</p><p class="paragraph" style="text-align:left;">Everything is running, alerts are firing, and investigations are kicking off. False positives are going through the roof. Maybe you catch some ransomware before it does real damage, or you get spooked by a false positive IOC related to APT BearPanda12347. You might think everything is working fine. The problem is, if you don&#39;t have a good way of feeding this information back into a <b>Lessons Learned</b> process, it&#39;s all for nothing. It&#39;ll work until it doesn&#39;t. And then you&#39;re left with broken processes, detections that suck, SOPs no one follows, and automations that never run.</p><p class="paragraph" style="text-align:left;">The DSAEM Loop describes this entire lifecycle. It starts with your <b>D</b>etection <b>E</b>ngineering, which defines what you&#39;re looking for. This feeds into the <b>S</b>tandard Operating Procedures that tell your team how to react. Those SOPs are then supercharged by <b>A</b>utomation & AI Agents. You validate everything with Threat <b>E</b>mulation, and finally, you wrap it all up with <b>M</b>etrics, which feeds right back into improving your detections. It connects all the dots.</p><h3 class="heading" style="text-align:left;" id="what-about-the-autonomous-ai-soc"><b>What About the Autonomous (AI) SOC?</b></h3><p class="paragraph" style="text-align:left;">Now, many of you are asking how to implement this kind of feedback loop when you&#39;re going the full Autonomous SOC route. It’s a great question because throwing AI at a broken process just creates a faster broken process.</p><p class="paragraph" style="text-align:left;">Here are the questions you need to be asking any AI SOC vendor:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Does the solution understand the detections it’s ingesting?</b> This is key. To understand the context and what to investigate, the AI needs to grasp the detection logic. After the investigation, it needs to provide feedback and recommendations to improve the detection itself. If the AI is just a black box, you’re losing a massive opportunity to tune your defenses.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>How does it handle operating procedures?</b> A one-size-fits-all approach doesn&#39;t work. It&#39;s important that your SOPs are assigned to your detections and that the platform can access this context to guide its investigation. Some SIEMs let you embed a playbook right in the detection definition, making it easy for an AI SOC platform to use. Can the AI access it, and what will it do with that information?<br></p></li><li><p class="paragraph" style="text-align:left;"><b>What about automation and AI agents?</b> This one is tricky. An AI SOC platform can suggest response actions or even trigger them if it&#39;s advanced enough. But this is where you need control. You’ll be the one building the automations or configuring the AI SOC solution to act. You need transparency here. An AI agent that just says &quot;I fixed it&quot; without explaining what it did is a nightmare waiting to happen.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Can it support threat emulation?</b> This is another critical piece, but let&#39;s take it a step further. The real question is, can the AI SOC solution connect to dedicated threat emulation platforms, like the Breach and Attack Simulation (BAS) tools we&#39;re all starting to use? This isn&#39;t just about manually running a test and checking the logs. An integration allows you to create a powerful, automated validation loop. Your BAS platform executes an attack scenario, and you can measure exactly how your detections, SOPs, and the AI SOC itself performed. Did it catch the multi-stage attack, or did it only see isolated events? Did it correctly correlate the data to identify the threat? This closes the loop between the &#39;<b>E</b>mulation&#39; and &#39;<b>M</b>etrics&#39; parts of your DSAEM framework automatically, providing continuous validation of your security posture.<br></p></li></ol><p class="paragraph" style="text-align:left;"><b>How does it handle metrics and the feedback loop?</b> You need a good idea of what you want to measure from the start. Build context into your detections so you can get metrics out. I like to measure the manual effort required for a specific SOP; this helps calculate the added FTE from automation. A good AI SOC should not only provide metrics on its own performance (accuracy, speed, false-positive reduction) but also give you the data to improve your entire security program.</p><h2 class="heading" style="text-align:left;" id="closing-thoughts"><b>Closing Thoughts</b></h2><p class="paragraph" style="text-align:left;">The move to Autonomous SOCs is already happening. But this isn’t about replacing people. It’s about stopping the waste. That Tier 1 role where you just chase alerts all day? That’s going away and it should. It’s not security work, it’s clicking.</p><p class="paragraph" style="text-align:left;">We’re finally moving toward real engineering work, building detections, tuning signals, and using automation that actually helps. AI can speed things up, but without feedback and tuning, it just makes the mess faster.</p><p class="paragraph" style="text-align:left;">The goal isn’t to replace analysts. It’s to give them space to focus on what matters. Building things. Fixing things. Learning stuff. That’s the SOC we should be aiming for. Not perfect but actually worth showing up for.</p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: Conifers AI</b></h2><p class="paragraph" style="text-align:left;"><b>About </b><b><a class="link" href="https://Conifers.ai?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops" target="_blank" rel="noopener noreferrer nofollow">Conifers.ai</a></b> </p><p class="paragraph" style="text-align:left;">Conifers CognitiveSOC™ is an AI SOC platform that transforms SecOps by adaptively scaling complex incident investigations effectively and efficiently. It continuously ingests incidents and an organization’s business context, adaptively learning and applying that knowledge to deliver more accurate investigations across Tier 1–3 incidents. In addition to enterprise SOCs, CognitiveSOC is also designed for the unique needs of MSSPs, from the operational model to the pricing and technology.<b> </b></p><p class="paragraph" style="text-align:left;">CognitiveSOC uses adaptive learning, deep understanding of business context (data, decisions, risk tolerance), and a feedback loop to help SOC teams solve the hard problems at scale. And we do this with maximum accuracy, environmental awareness, and cost-effectiveness in an easy-to-deploy, non-disruptive solution. </p><p class="paragraph" style="text-align:left;"><b>Solving Enterprise and MSSP SOC Challenges </b></p><p class="paragraph" style="text-align:left;">Conifers is purpose-built to solve the challenges and address the pains of enterprise SOCs and MSSPs:  <br><br><b>No visibility into SOC impact on the business </b><br>The platform’s strategic dashboard helps organizations understand and prove proactive risk reduction, and team efficiency and effectiveness, not just standard MTT(x) </p><p class="paragraph" style="text-align:left;"><b>One-size-fits-all tool approach doesn’t fit us </b> <br>Conifers continuously ingests and adapts investigations based on an organization’s own data, historical behavior and risk tolerances (or that of their tenants’) </p><p class="paragraph" style="text-align:left;"><b>Repetitive tasks = inconsistent results and analyst burnout </b><br> Conifers’ robust feedback loop refines detections for higher  <br>accuracy and reduced noise </p><p class="paragraph" style="text-align:left;"><b>Another new tool, another new distraction </b> <br>The CognitiveSOC works within your existing incident management system — no need for ”context switching” </p><p class="paragraph" style="text-align:left;">If you would like to learn more about Conifers<a class="link" href="https://www.conifers.ai/demo?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops" target="_blank" rel="noopener noreferrer nofollow"> you can schedule a live demo here.</a> </p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customise and utilise these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=automate-smarter-not-louder-using-interactive-ai-feedback-loops"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=281dab74-1c82-458f-a2a3-8ddb7642e6a6&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Will MCP, A2A and AG-UI help us the Single pane of glass for SecOps</title>
  <description>Uncover how MCP, A2A, and AG-UI could revolutionize SecOps integration, offering a potential &#39;single pane of glass&#39; solution to longstanding workflow challenges.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/efc2153a-48df-48d3-9fb5-672de7d49b68/MCP__A2A__AG-UI_for_SecOps.gif" length="645216" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops-c12d22215aa28244</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops-c12d22215aa28244</guid>
  <pubDate>Tue, 17 Jun 2025 16:42:45 +0000</pubDate>
  <atom:published>2025-06-17T16:42:45Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">We&#39;ve all been chasing the &#39;single pane of glass&#39; for what feels like forever, right? Another dashboard, another so-called &#39;solution.&#39; I&#39;ve been digging into some tech lately MCP, A2A, and AG-UI ,and honestly, it looks like we might finally have the tools to build this thing ourselves. Imagine that.</p><p class="paragraph" style="text-align:left;">How I see it is that MCP and A2A will help us fix the integration problem. For a long time, this has been (and still is) a painful process: going through API documentation, building integrations (or requesting one and waiting for a year to get it implemented, or even worse, the vendor tells you they have a voting system, meaning it will never get implemented if none of the big customers want it). And even if you build it, the second challenge is maintaining it; the more API actions you use, the harder it is to maintain.</p><p class="paragraph" style="text-align:left;">So, let’s break down what each of these technologies means and how they can contribute to a more unified and intelligent SecOps environment.</p><h1 class="heading" style="text-align:left;" id="quick-refresher-what-are-ai-agents"><b>Quick Refresher: What Are AI Agents?</b></h1><p class="paragraph" style="text-align:left;">An AI agent (or more technically, a group of cooperating, task-specific AI agents) is an intelligent system powered by artificial intelligence, particularly large language models (LLMs), designed to perform specific tasks autonomously or semi-autonomously. Within security operations, these agents significantly enhance the SOC team&#39;s efficiency by automating repetitive tasks, augmenting human decision-making, and ensuring consistent, rapid responses to threats. Currently, many of the Agentic AI solutions (also known as Agentic AI SOC Analysts) are focused on automating alert triage and investigation, specifically around Tier 1/Tier 2 investigations. </p><p class="paragraph" style="text-align:left;">As previously discussed in our detailed exploration of SOC AI agents, we outlined four main categories tailored to cybersecurity operations:</p><ol start="1"><li><p class="paragraph" style="text-align:left;"><b>Tool-Using Agents</b>: Combining LLM reasoning capabilities with external tool integration (e.g., APIs, SIEMs, EDR platforms). They function as &quot;smart SOC assistants&quot; that handle data retrieval, enrichment, and automated actions.</p></li><li><p class="paragraph" style="text-align:left;"><b>Reasoning Agents (ReAct, Chain-of-Thought)</b>: These agents explicitly outline their reasoning steps, enhancing transparency and trust in decision-making, critical for compliance-heavy environments.</p></li><li><p class="paragraph" style="text-align:left;"><b>Memory-Enhanced Agents</b>: Equipped with memory capabilities, these agents learn from historical alerts, patterns, and analyst feedback, progressively refining their contextual awareness and reducing redundant analysis.</p></li><li><p class="paragraph" style="text-align:left;"><b>Agentic RAG (Retrieval-Augmented Generation + Autonomy)</b>: Advanced agents that autonomously retrieve and synthesise diverse data sources, perfect for complex investigations where multiple context points are essential.</p></li></ol><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#0f3c71;"><b>BlinkOps</b></span></p><div class="embed"><a class="embed__url" href="https://www.blinkops.com/product/agent-builder?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops" target="_blank"><div class="embed__content"><p class="embed__title"> BlinkOps No-Code Security Agent Builder </p><p class="embed__description"> The industry&#39;s first enterprise platform to build your own custom security agents. Blink enables you to build custom security agents with roles and responsibilities specifically designed to fit your enterprise&#39;s unique environment and your security teams needs. Blink Agents deliver a robust Task-Based Automation solution that doesn&#39;t sacrifice control. They combine the strengths of AI Agents with the control and security of deterministic workflows. </p></div><img class="embed__image embed__image--right" src="https://cdn.prod.website-files.com/62000f475eba4d3330543f5b/65a162867ee9e217bf05de97_Blink-2024-OG.png"/></a></div><hr class="content_break"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/efc2153a-48df-48d3-9fb5-672de7d49b68/MCP__A2A__AG-UI_for_SecOps.gif?t=1750175532"/></div><h1 class="heading" style="text-align:left;" id="decoding-the-building-blocks-mcp-a-"><b>Decoding the Building Blocks: MCP, A2A, and AG-UI</b></h1><p class="paragraph" style="text-align:left;">To understand their collective potential, let&#39;s first define each component:</p><p class="paragraph" style="text-align:left;"><b>1. MCP (Model Context Protocol): Standardising Agent-Tool Interaction</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Definition:</b> MCP, in the context we&#39;re discussing, refers to <b>Model Context Protocol</b>. This is not to be confused with other &quot;MCP&quot; acronyms like Mission Control Platform. Model Context Protocol is designed to standardise how AI models, particularly Large Language Models (LLMs), interact with external tools, APIs, and data sources. Think of it as a universal adapter that allows an AI agent to seamlessly &quot;plug into&quot; various tools it needs to perform tasks. It often uses standards like JSON-RPC 2.0 and enables an LLM to be &quot;fed&quot; context or call a tool by providing a structured way to define tool capabilities and exchange information.</p></li><li><p class="paragraph" style="text-align:left;"><b>How it helps SecOps:</b> In cybersecurity, an AI agent equipped with MCP could:</p><ul><li><p class="paragraph" style="text-align:left;">Reliably query a threat intelligence platform for the latest on an indicator.</p></li><li><p class="paragraph" style="text-align:left;">Instruct a vulnerability scanner to perform a specific scan and retrieve the results in a usable format.</p></li><li><p class="paragraph" style="text-align:left;">Interact with a SIEM or SOAR platform&#39;s API to fetch additional logs or trigger a predefined response action.</p></li><li><p class="paragraph" style="text-align:left;">Gather context from diverse security tools without needing bespoke, brittle integrations for each one. This directly addresses the integration pain points mentioned earlier, as it aims to provide a consistent method for AI to access tool functionalities.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"><b>2. A2A (Agent-to-Agent Communication): Enabling Collaborative AI</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Definition:</b> A2A communication establishes a common language and protocol for different AI agents to discover each other, negotiate tasks, share information and context, and collaborate to achieve common goals. This allows for the creation of multi-agent systems where specialized agents can work together, even if they are developed by different vendors or for different primary purposes. These protocols often ensure secure and structured data exchange, supporting features like context passing, stateful interactions, and permission controls.</p></li><li><p class="paragraph" style="text-align:left;"><b>How it helps SecOps:</b> A2A is crucial for building a truly intelligent and autonomous SOC. Imagine:</p><ul><li><p class="paragraph" style="text-align:left;">A &quot;Triage Agent&quot; that performs initial alert enrichment could use A2A to pass its findings to a specialised &quot;Reactive Threat Hunting Agent&quot;.</p></li><li><p class="paragraph" style="text-align:left;">The Threat Hunting Agent, after uncovering deeper threats by querying various tools (potentially via MCP), could use A2A to coordinate with a &quot;Response AI Agent&quot; to execute containment actions like isolating a host or blocking an IP address.</p></li><li><p class="paragraph" style="text-align:left;">Different agents specialising in IOC enrichment, asset context, and malware analysis could share their findings in real-time to build a comprehensive understanding of an incident much faster than a human analyst working alone or a monolithic automation script.</p></li></ul></li></ul><p class="paragraph" style="text-align:left;"><b>3. AG-UI (Agentic User Interface): Crafting the Human-AI Partnership</b></p><ul><li><p class="paragraph" style="text-align:left;"><b>Definition:</b> An Agentic User Interface (AG-UI) facilitates natural and effective interaction between human users and AI agents (or systems of AI agents). Instead of just a dashboard displaying data, an AG-UI allows users to converse with agents, delegate tasks using natural language, receive proactive suggestions, and understand the reasoning behind agent decisions and actions. It&#39;s about creating a collaborative workspace where humans and AI can augment each other&#39;s capabilities. It focuses on explainability, interactivity, and allowing users to supervise and guide AI agents effectively.</p></li><li><p class="paragraph" style="text-align:left;"><b>How it helps SecOps:</b> This is where the &quot;single pane of glass&quot; vision truly comes to life:</p><ul><li><p class="paragraph" style="text-align:left;">SOC analysts could interact with a suite of security agents through a unified, conversational interface. Instead of manually querying multiple tools, they could ask: &quot;What&#39;s the latest on the phishing attempt from this morning? Has the source been blocked, and have we seen similar attempts?&quot;</p></li><li><p class="paragraph" style="text-align:left;">The AG-UI could present a consolidated view of an incident, not just raw data, but a narrative pieced together by collaborating agents, showing the steps taken, the rationale, and proposed next actions. Analysts could then approve, modify, or query these actions.</p></li><li><p class="paragraph" style="text-align:left;">It can help demystify complex AI processes by providing transparency into agent operations , building trust and enabling analysts to effectively supervise AI-driven tasks.</p></li></ul></li></ul><h1 class="heading" style="text-align:left;" id="the-convergence-towards-an-intellig"><b>The Convergence: Towards an Intelligent, Unified SOC</b></h1><p class="paragraph" style="text-align:left;">The real magic happens when MCP, A2A, and AG-UI work in concert:</p><ul><li><p class="paragraph" style="text-align:left;"><b>MCP handles the &quot;how&quot; of tool use:</b> It allows individual agents to reliably interact with the diverse set of security tools in the SOC&#39;s arsenal – from EDRs and firewalls to threat intel feeds and vulnerability scanners. This solves the fundamental integration challenge.</p></li><li><p class="paragraph" style="text-align:left;"><b>A2A manages the &quot;who&quot; and &quot;what&quot; of collaboration:</b> It enables these specialized agents, each proficient with certain tools via MCP, to communicate their findings, share context, and coordinate complex workflows. For instance, an &quot;IOC Enrichment Agent&quot; uses MCP to query VirusTotal, then uses A2A to share the results with a &quot;Timeline Analysis Agent&quot; and an &quot;Incident Coordinator Agent&quot;.</p></li><li><p class="paragraph" style="text-align:left;"><b>AG-UI provides the &quot;where&quot; and &quot;why&quot; for human oversight:</b> It offers a centralized interface where human analysts can understand the bigger picture assembled by these collaborating agents, drill down into specifics, provide judgment, and steer the overall response. This makes the advanced automation accessible and trustworthy.</p></li></ul><p class="paragraph" style="text-align:left;">This combination directly tackles the desire for a &quot;single pane of glass&quot; not by just aggregating dashboards, but by creating an interactive, intelligent system that automates much of the underlying data gathering, correlation, and even decision-making, while keeping humans firmly in the loop for critical judgment and strategic oversight.</p><h2 class="heading" style="text-align:left;" id="analogy-to-human-soc-teams"><b>Analogy to Human SOC Teams:</b></h2><p class="paragraph" style="text-align:left;">Think about how a human SOC team operates:</p><ul><li><p class="paragraph" style="text-align:left;">Analysts have their specialized tools (SIEM, EDR console, TI portal) – <b>MCP</b> ensures AI agents can also use their &quot;tools.&quot;</p></li><li><p class="paragraph" style="text-align:left;">Analysts communicate with each other during an investigation (e.g., a Tier 1 analyst escalates to Tier 2, who consults a malware specialist) – <b>A2A</b> enables AI agents to have similar collaborative dialogues.</p></li><li><p class="paragraph" style="text-align:left;">The SOC manager or lead analyst has an overall view, receives summaries, and makes critical decisions – <b>AG-UI</b> aims to provide this interactive, supervisory layer for human operators overseeing AI agents.</p></li></ul><h2 class="heading" style="text-align:left;" id="practical-implications-for-security"><b>Practical Implications for Security Automation</b></h2><p class="paragraph" style="text-align:left;">Integrating AI agents using this trifecta can move SecOps beyond rigid, rule-based playbooks towards more adaptive, context-aware automation.</p><ul><li><p class="paragraph" style="text-align:left;"><b>Reduced Integration Burden:</b> MCP’s standardized approach to tool interaction could significantly cut down the time and effort spent building and maintaining custom integrations for every new tool or API change.</p></li><li><p class="paragraph" style="text-align:left;"><b>Smarter Enrichment:</b> Instead of a 10-step enrichment playbook that often breaks , an agent (or a team of agents using MCP and A2A) can dynamically figure out what data it needs, fetch it from various sources, and synthesize a much richer contextual picture.</p></li><li><p class="paragraph" style="text-align:left;"><b>Dynamic Triage and Prioritization:</b> A &quot;Triage Classifier Agent&quot; could use learned patterns and real-time context (gathered via MCP and shared via A2A with other intelligence agents) to more accurately prioritize alerts, reducing alert fatigue.</p></li><li><p class="paragraph" style="text-align:left;"><b>Automated Threat Hunting Loops:</b> A &quot;Reactive Threat Hunting Agent&quot; could be triggered by a high-confidence alert, use MCP to query historical data across multiple platforms, identify patterns, and even suggest new detection rules or areas for proactive hunting, all while informing the human analyst via the AG-UI.</p></li><li><p class="paragraph" style="text-align:left;"><b>Streamlined Incident Response:</b> From initial detection and enrichment through investigation, containment, and eradication, different AI agents can take on specialized tasks, coordinating via A2A and presenting a unified view and control points to human responders through the AG-UI. This is evident in the blueprint discussed for AI agents handling alert reception, reactive threat hunting, and response actions.</p></li></ul><h1 class="heading" style="text-align:left;" id="the-challenges-ahead"><b>The Challenges Ahead</b></h1><p class="paragraph" style="text-align:left;">While the vision is compelling, it&#39;s not without hurdles:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Standardisation:</b> The success of MCP and A2A relies on widespread adoption of common standards. While initiatives exist, achieving industry-wide consensus takes time.</p></li><li><p class="paragraph" style="text-align:left;"><b>Security of the Agents Themselves:</b> If agents can take action, they become targets. Securing the agents, their communication (A2A), and their tool interactions (MCP) is paramount. This includes addressing risks like data leakage, unauthorised tool access, and potential manipulation of agent decision-making.</p></li><li><p class="paragraph" style="text-align:left;"><b>Complexity:</b> Building, managing, and debugging systems of interconnected, autonomous agents can be complex.</p></li><li><p class="paragraph" style="text-align:left;"><b>Trust and Transparency:</b> Analysts need to trust these systems. AG-UIs must be designed to provide transparency into agent reasoning and actions (&quot;opaque decisions&quot; are a major pitfall ), and robust guardrails and human oversight mechanisms are crucial.</p></li><li><p class="paragraph" style="text-align:left;"><b>Training and Cultural Shift:</b> SOC teams need to be trained not just on new tools, but on how to collaborate effectively with AI teammates. This involves teaching prompting, delegation, and supervision skills.</p></li></ul><h1 class="heading" style="text-align:left;" id="final-thoughts-the-build-or-buy-mom"><b>Final Thoughts: The “Build or Buy” Moment for SecOps</b></h1><p class="paragraph" style="text-align:left;">The potential here is massive. For the first time, it feels like we have the right building blocks MCP, A2A, and AG-UI to finally crack the integration and automation problem without just adding another layer of complexity. The conversation is shifting from &quot;if&quot; we can automate to &quot;how&quot; we do it intelligently.</p><p class="paragraph" style="text-align:left;">This brings every SecOps team to a crossroads: do you start piecing these technologies together yourself, or do you look for a platform that has already harnessed this power?</p><p class="paragraph" style="text-align:left;">Building it in-house gives you ultimate control, but it&#39;s a heavy lift. On the other hand, a new breed of security automation platforms is emerging that&#39;s built on these very agentic principles. They offer a way to get the power of AI agents without the massive R&D effort, giving teams a launchpad into AI-first SecOps.</p><p class="paragraph" style="text-align:left;">The key takeaway is that you&#39;re no longer stuck with the old, rigid playbooks of the past. Whether you build or buy, the future of the SOC is intelligent, adaptive, and agent-driven.<br><br>Have opinion on this, join the discussion <a class="link" href="https://www.linkedin.com/posts/filipstojkovski_unpopular-opinion-we-might-be-heading-back-activity-7340490540162957312-9ruU?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAaBOzkBTc_ZR17eSbkwr81NBBX__ne2uJw" target="_blank" rel="noopener noreferrer nofollow">here</a>!</p><h1 class="heading" style="text-align:left;" id="vendor-spotlight-blink-ops"><b>Vendor Spotlight: </b><span style="color:#0f3c71;"><b>BlinkOps</b></span></h1><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>BlinkOps</b> is a modern security automation platform purpose-built for teams looking to deploy AI-driven workflows without drowning in code. The platform combines low-code flexibility with the intelligence of AI agents, giving security teams a way to automate repetitive tasks while staying adaptable to real-world changes.<br><br>What makes BlinkOps stand out is its approach to agents. Instead of chaining rigid steps like in traditional playbooks, you assign goals, define context, and BlinkOps agents handle the rest—enrichment, investigation, correlation, and escalation.</p><p class="paragraph" style="text-align:left;">It&#39;s especially strong for SOC teams who want to:</p><ul><li><p class="paragraph" style="text-align:left;">Automate alert triage and incident response without writing complex scripts </p></li><li><p class="paragraph" style="text-align:left;">Scale workflows across cloud, endpoint, identity, and email tools </p></li><li><p class="paragraph" style="text-align:left;">Customise logic when needed but still launch fast with prebuilt templates</p></li></ul><p class="paragraph" style="text-align:left;">Whether you&#39;re modernising a legacy SOAR setup or starting fresh with AI-native tooling, BlinkOps gives you the structure of playbooks with the smarts of autonomous agents. Think of it as your bridge from rule-based automation to AI-first SecOps <br></p><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.blinkops.com/product/agent-builder?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops" target="_blank" rel="noopener noreferrer nofollow">www.blinkops.com/product/agent-builder</a></p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=will-mcp-a2a-and-ag-ui-help-us-the-single-pane-of-glass-for-secops"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=48f3891c-cd2c-47e0-abaa-f3471de5dff6&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Measuring ROI of AI agents in security operations</title>
  <description>Introducing PICERL Index</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5661e09c-345a-43dd-9fd0-34e4a262c594/PICER_Index_.gif" length="741883" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/measuring-roi-of-ai-agents-in-security-operations-9a67fdab64192ed0</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/measuring-roi-of-ai-agents-in-security-operations-9a67fdab64192ed0</guid>
  <pubDate>Thu, 29 May 2025 16:16:00 +0000</pubDate>
  <atom:published>2025-05-29T16:16:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">If you&#39;ve been around this blog for a while, you know we love cutting through the noise. Last time we geeked out over the shift from rule-based playbooks to adaptive AI agents. Today we’re diving into something even messier: how do we measure ROI and KPI when it comes to AI tools within Security Operations?</p><p class="paragraph" style="text-align:left;">Spoiler alert: It’s not just about how many alerts they auto-close.</p><p class="paragraph" style="text-align:left;">Yeah, I get it, everyone wants clean dashboards, KPIs, some might still want that pew pew cyber map (yes, they are still a thing:<a class="link" href="https://threatmap.checkpoint.com/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow"> https://threatmap.checkpoint.com/</a>).</p><p class="paragraph" style="text-align:left;">But here’s the uncomfortable truth: closing alerts doesn’t mean your SOC is getting smarter. It just means you’re sweeping faster. And with a whole AI and Agentic staff, it&#39;s no longer just about how fast you process alerts. Yes, you still want to show that you now close alerts in 15 minutes rather than 1 hour, but in the end, I don&#39;t care if the Autonomous (AI) SOC solution closes the alert in 10 seconds or 60 seconds. Now we are in an era of trust; I&#39;m interested in how accurate the analysis was, why it involved a human, why it closed a false positive, and whether it fed back to detection engineering for improvement.</p><p class="paragraph" style="text-align:left;">What really matters is whether your AI agents are helping you improve over time (please don&#39;t measure how they replace you over time, that won&#39;t work and we are not there yet; remember when SOAR promised it would automate and replace analysts? Ten years later, we still didn&#39;t win that metric).</p><p class="paragraph" style="text-align:left;">So, because I like to invent terms (because in cybersecurity we will never stop doing that, and I realized I&#39;m not the one who will change it), I’ve mapped out how to measure if your AI tools are actually pulling their weight across the entire security incident lifecycle , from preparation all the way through to learning and adapting. I’m calling this framework <b>the PICERL Index for Autonomous (AI) SOC</b>. PICERL (that’s P-I-C-E-R-L) stands for <b>P</b>reparation, <b>I</b>dentification, <b>C</b>ontainment, <b>E</b>radication, <b>R</b>ecovery, and the critical <b>L</b>earning phase. The whole idea behind this Index is to break down when to use which metric, so you can see if your AI SOC is truly getting smarter, not just faster.</p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"></div><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#0f3c71;"><b>Prophet Security</b></span></p><div class="embed"><a class="embed__url" href="https://qualtricsxm7fx97htf3.qualtrics.com/jfe/form/SV_6fI2jWsksw3P9Z4?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank"><div class="embed__content"><p class="embed__title"> How’s AI Really Being Used in the SOC? <br>Tell Us </p><p class="embed__description"> We’re running a quick 8-10 minute survey to find out how teams are actually using AI in the SOC. The first 100 qualified respondents get a $50 Amazon gift card, and everyone gets early access to the full report.<br><br>Help shape one of the most forward-looking industry benchmarks on AI in security operations.<br><br>Why take it?<br><br>- See how your peers are using AI in their SOC<br>- Receive the full anonymized report before public release<br>- $50 Amazon gift card for the first 100 qualified respondents<br><br>Complete the survey now </p></div><img class="embed__image embed__image--right" src="https://cdn.prod.website-files.com/66082cf1d4c6684fb536dfbe/67ed7062e5b04684d8185526_Homepage-open-graph-image.png"/></a></div><hr class="content_break"><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/5661e09c-345a-43dd-9fd0-34e4a262c594/PICER_Index_.gif?t=1748443079"/></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Preparation Phase : Where Engineering Sets the Stage</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Alright, let&#39;s be brutally honest: <b>start here or don’t bother starting at all.</b> If your AI doesn’t have decent visibility, good context, or sharp detection logic to chew on, it’s basically just guessing with a very expensive, straight face. You’re setting it up to fail.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Log Source Coverage</b> - Are you even logging the right stuff? You can’t investigate what you can’t see, and neither can your AI. This isn&#39;t about vanity metrics; it&#39;s about answering the hard questions <i>before</i> you blame the AI for missing something:</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">What critical parts of your environment are actually monitored? And what’s still in the dark ages?</p></li><li><p class="paragraph" style="text-align:left;">What telemetry genuinely supports threat detection versus what’s just noise or good for a leisurely investigation <i>after</i> the fact</p></li><li><p class="paragraph" style="text-align:left;">Where are the glaring data gaps that are basically inviting attackers to waltz through your threat coverage blind spots? If your AI is working with data scraps, what miracle are you actually expecting? Garbage in, AI-powered garbage out.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Time-to-value </b>- Since this is a blog post on the return on AI investment, time-to-value should not be ignored, and is often one of the first metrics that will become self-evident. It can also set the stage for all other metrics to either falter or shine. </p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">Speed of initial deployment: The clock starts the moment you pay for an AI tool (or sign the initial POV agreement), and every delay in deployment is a negative for the return on your investment. And these delays are the canary in the coal mine for the AI’s future, often speaking to an architectural challenge.</p></li><li><p class="paragraph" style="text-align:left;">Speed of additional integrations: Deployment and integration challenges have been the proverbial bane of many SOC automation solutions. AI tools need access to organizational data (SIEM, cloud, datalakes, data stores, case mgmt, workflow tools, etc.) to be effective. Building and maintaining these integrations will be a key factor in determining the return on the AI investment.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Detection Engineering Metrics</b> - Yeah, these are the old-school classics, but they’re still terrifyingly relevant. If your human-built detections suck, your AI is just going to automate that suckage at machine speed.<br></p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;"><b>True/False Positive Rates:</b> Still the undisputed king. How many <i>actual</i> incidents are your detections catching (True Positives) versus how much digital chaff and time-wasting noise are they spewing out (False Positives)? If your AI is trying to drink from a firehose of false positives from your existing detection layer, guess what its &quot;intelligent&quot; decisions will be based on? More noise.</p></li><li><p class="paragraph" style="text-align:left;"><b>MITRE ATT&CK Coverage:</b> This isn&#39;t about collecting ATT&CK techniques like Pokémon cards for your next &quot;cyber bingo&quot; presentation. It&#39;s about ruthlessly assessing if your detections give you real-world visibility into how attackers <i>actually</i> operate. Are you covered against common (and not-so-common) TTPs, or are you just hoping for the best?</p></li><li><p class="paragraph" style="text-align:left;"><b>Detection Effectiveness Over Time:</b> Are your detections getting sharper, stagnating, or (God forbid) getting dumber as your environment and the threat landscape morph? If this is degrading, especially when you&#39;re feeding these detections into an AI, your AI is essentially learning from a C-student. Not a recipe for genius.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>SOP Efficiency</b> - Your Standard Operating Procedures, those lovingly crafted (or ancient and dusty) playbooks. Are they <i>actually</i> helping your human analysts, or are they a bureaucratic nightmare they secretly ignore?</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">How many steps are still painfully manual versus smoothly automated?</p></li><li><p class="paragraph" style="text-align:left;">More importantly, are analysts consistently skipping steps or going off-script because the SOP is out of touch with reality? If your human team finds your playbooks useless, what divine intervention makes you think an AI will magically make them effective? This is about asking: are these playbooks even fit for human consumption, let alone as a reliable script for your AI?</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Automation/Orchestration Usage</b> - This is where the AI rubber starts to meet the SOC road, often via SOAR or some preliminary AI tooling. Sure, measure how many alerts your automation <i>touches</i> and the theoretical time saved – that’s the shiny dashboard stuff.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">But the <i>real</i> gold is in the &quot;oops&quot; metrics: how often does that fancy automation fall flat on its face, requiring a human to rush in and clean up the digital mess? High failure or rollback rates here are your early warning sign that the AI (or the processes it&#39;s trying to follow) isn&#39;t ready for prime time.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Identification Phase</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">This is where the true grit of your <b>AI P.I.C.E.R Index</b> starts to show. Can your AI actually separate the signal from the overwhelming noise?</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>MTTD/MTTA (Mean Time to Detect / Mean Time to Acknowledge)</b> — Yeah, these old dogs still hunt, and they&#39;re foundational. How fast do you <i>spot</i> something potentially malicious (Detect)? And how quickly does someone – or some<i>thing</i> – officially <i>notice</i> it (Acknowledge)?</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">But here&#39;s the twist: AI is blurring these lines. &quot;Acknowledge&quot; used to be a human analyst begrudgingly clicking a button. Now, your AI might be the one giving the nod, or it might detect, acknowledge, and even decide on next steps in one seamless, sub-second blur. Are you measuring this new reality, or are you stuck in the last decade?</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Mean Time to Triage (MTTT)</b> — Okay, I might be evangelizing this one a bit, but hear me out, because it&#39;s crucial for AI. This measures how lightning-fast (or embarrassingly slow) your AI moves from the moment an alert lands in its lap (ingestion) to making that critical first-pass decision: &quot;Is this junk? Is this a five-alarm fire? Or does this need a closer, human look?&quot;</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">If you’re only tracking MTTA, you’re missing the AI&#39;s internal &quot;thinking&quot; and sorting time. If your AI takes an hour to triage an alert a human could nail in 5 minutes (or vice-versa!), that tells you a hell of a lot about its efficiency, doesn&#39;t it?</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Auto-Closed Alerts</b> — Ah, the siren song of green dashboards! Everyone loves to see alerts automatically closed because it <i>looks</i> like efficiency. But let&#39;s get real: you need both volume <i>and</i> precision here.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">A high auto-close rate is fantastic... <i>unless</i> your analysts are constantly diving back in, muttering &quot;Nope, AI, you totally blew that one,&quot; and reopening those same alerts. That high-reversal scenario isn&#39;t progress; it’s just digital whack-a-mole, creating more work and eroding trust. Track this auto-close-to-reversal ratio like your job depends on it – because it might.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Escalation Rate</b> — A truly smart AI isn&#39;t a know-it-all; it knows when to raise its hand and ask a human for help. But this metric cuts both ways.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">How often is the AI <i>right</i> to escalate something that genuinely needs human eyeballs?</p></li><li><p class="paragraph" style="text-align:left;">And how often is it just getting spooked by shadows and crying wolf, flooding your team with non-issues? If your AI is the digital boy who cried wolf, your analysts will tune it out. If it never cries wolf, are you <i>sure</i> it&#39;s not silently missing the whole damn pack?</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>AI Decision Accuracy</b> — This is where the trust is forged – or shattered into a million cynical pieces. Can it actually tell the good from the bad, the threat from the trivial? You have to break it down:</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">True Positive Accuracy: When there&#39;s a real baddie, can the AI reliably sniff it out and call it correctly? This is table stakes.</p></li><li><p class="paragraph" style="text-align:left;">False Positive Accuracy<i>:</i> Is your AI smart enough to dismiss the endless torrent of benign alerts and operational BS without breaking a sweat? This is where a lot of AI falls down.</p></li><li><p class="paragraph" style="text-align:left;">Roll these (and maybe other factors) into an overall AI Confidence Score. Is your AI getting more sure-footed and reliable over time, or is it still tripping over its own digital shoelaces with every other alert?</p><p class="paragraph" style="text-align:left;"></p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Feedback Loop Metrics</b> — Think of this as the AI&#39;s ongoing &quot;schooling&quot; by your seasoned human experts. How often are your analysts giving the AI an &#39;attaboy&#39; for a good call, versus a &#39;nope, try again, kiddo,&#39; or adding crucial context the AI missed?</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">More importantly, is this valuable feedback actually being used to make the AI smarter? Is it being systematically fed back into your detection rules, your playbooks, or even into retraining the underlying model? If not, you&#39;re just shouting helpful advice at a very expensive, unlistening wall.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Explainability Time</b> — If your AI makes a call, how long does it take your (very expensive) human analyst to decipher <i>why</i> the AI did what it did? This isn&#39;t just about transparency; it&#39;s about operational speed.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">If the AI&#39;s &quot;show your work&quot; is faster, clearer, and more trustworthy than an analyst digging through raw logs from scratch, you’ve got a genuine productivity win. If its decisions come out of a black box like cryptic decrees from an oracle, good luck building the trust needed for real automation.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Containment & Eradication </b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Alright, let&#39;s be clear before we get too excited about AI taking over in the <b>Containment & Eradication</b> phase. While fully autonomous response is the ultimate goal for some, and AI can be incredibly fast at <i>identifying</i> what needs to be contained or eradicated, I strongly advise caution before letting AI <i>autonomously execute</i> widespread or irreversible actions. Direct human oversight or extremely well-vetted, trusted automation playbooks should still be involved for high-impact changes.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">AI&#39;s immediate and immense strength in this phase is accurately identifying and preparing the <i>right</i> response actions with precision, pinpointing exactly what to block, what to isolate, or what process to terminate. It should then primarily trigger your robust, pre-approved automation (the kind with built-in safety mechanisms and comprehensive logging) or alert your skilled human responders to perform the final execution, particularly for critical system changes. The AI provides high-quality intelligence and the recommended action; the execution still needs a reliable, controlled mechanism.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">With that critical point about controlled execution made, let&#39;s look at metrics that measure how AI contributes to making this process fast and accurate:</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>MTTI/MTTR (Mean Time to Isolate/Mean Time to Remediate)</b> - How fast can your AI <i>identify and help initiate</i> the lockdown (Isolate) or the cleanup (Remediate)? Even if it&#39;s handing off to another system or a human for the final decision on major actions, AI&#39;s speed in reaching that &#39;go/no-go&#39; point and preparing the necessary steps is what we&#39;re heavily measuring here. If your AI <i>is</i> permitted to take direct (but carefully scoped and validated!) actions, this metric then also captures its raw execution speed. The objective is to drastically shrink the window of compromise.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Containment Accuracy</b> - This is absolutely crucial, whether AI is merely suggesting the containment action or has the authority to initiate the command itself. Did it target the <i>right</i> infected host for isolation, or did it misidentify based on superficial data and attempt to affect critical infrastructure unnecessarily? Did it precisely identify the malicious process, or did it interfere with a legitimate critical business application? Precision here is what prevents your security response from turning a nasty incident into a self-inflicted business catastrophe. &quot;Oops&quot; doesn&#39;t cut it when you&#39;re talking about containment.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Recovery </b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">This is the &quot;getting back to normal&quot; phase, the part everyone wants to rush through but is critical for resilience.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Mean Time to Recover</b> — How long does it take to get affected systems fully cleaned up, restored, and back to business-as-usual operation? Your business <i>definitely</i> notices this one, even if your security team is already chasing the next fire.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;">AI might not be racking new physical servers for you just yet (though, give it a few years!), but it damn well better be helping to document the entire chaotic episode: what happened, what actions were taken (by humans and AI), what the impact was, and what was learned. This feeds directly into making the <i>next</i> recovery faster and less painful.</p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Learning Phase - Continuous Improvement & Trust</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Alright, let&#39;s dig into some more advanced concepts. Pulling from some interesting research (and a healthy dose of common sense, frankly), if you&#39;re serious about an AI SOC that doesn&#39;t just stagnate, these advanced ideas deserve a prime spot in your <b>PICERL Index strategy</b>:</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Model Drift Tracking</b> — Is your AI&#39;s expensive brainpower actually getting sharper over time, or is it slowly degrading into digital mush as the real-world environment, your business, and attacker techniques change while the model stays static? A model trained six months or a year ago might be dangerously clueless against today&#39;s evolving threats. If you&#39;re not tracking this, your once-genius AI might now be a well-meaning but ultimately ineffective digital paperweight.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Escalation-to-Accuracy Ratio</b> — This metric tells you how much your human team can actually <i>trust</i> what the AI decides to flag for them. Of the alerts the AI <i>does</i> escalate, what percentage are <i>actually</i> critical, correctly identified, and warranting human intervention? You want few escalations, but those few should be high-fidelity, spot-on alerts. High accuracy on a small number of escalations? That’s the AI sweet spot. That’s an AI your team will listen to, not one they&#39;ll eventually learn to ignore.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Explainability Score</b> — Going beyond just &quot;Explainability Time,&quot; how <i>good</i> are the AI&#39;s explanations for its decisions? Are they consistently clear, accurate, and genuinely useful to your analysts? This might be more qualitative, maybe even a rubric-based score your analysts contribute to. Do the explanations help them understand the &#39;why&#39; and learn? Bonus points if your analysts start saying, &quot;Yeah, I can see why the AI flagged that; it makes sense.&quot; That&#39;s when you know you&#39;re building real synergy and trust, not just throwing tech at a problem.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Adversarial Robustness</b> — Let&#39;s be blunt: the bad guys aren&#39;t stupid, and they aren&#39;t going to play nice with your shiny new AI. They <i>will</i> actively try to fool it, evade it, or even poison its data inputs. How well does your AI hold up when poked, prodded, or fed deliberately deceptive inputs designed to make it misclassify threats? Frankly, this is prime territory for your red team to have some fun and earn their keep. If your AI crumbles or goes haywire at the first sign of intelligent opposition, it’s not much of a cyber defender, is it.</p></div><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><div class="custom_html"><div style="position: relative; width: 100%; height: 0; padding-top: 56.2225%; padding-bottom: 0; box-shadow: 0 2px 8px 0 rgba(63,69,81,0.16); margin-top: 1.6em; margin-bottom: 0.9em; overflow: hidden; border-radius: 8px; will-change: transform;"><iframe style="position: absolute; width: 100%; height: 100%; top: 0; left: 0; border: none; padding: 0;margin: 0;" src="https://www.canva.com/design/DAGoz4dbQzs/IqCWbn9DZxKiO6e_XyuUmA/view?embed" allowfullscreen="allowfullscreen" allow="fullscreen"></iframe></div><a href="https://www.canva.com/design/DAGoz4dbQzs/IqCWbn9DZxKiO6e_XyuUmA/view?utm_content=DAGoz4dbQzs&utm_campaign=designshare&utm_medium=embeds&utm_source=link" rel="noopener">AI P.I.C.E.R Index Metrics </a></div></div><p id="ive-created-a-dedicated-page-where-" class="paragraph" style="text-align:left;"><b>I’ve created a dedicated page where you can get an overview of all the metrics. </b><br><b>Check it out:</b> <a class="link" href="https://reports.cybersec-automation.com/picerl-index-ai-soc?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">https://reports.cybersec-automation.com/picerl-index-ai-soc</a></p><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h3 class="heading" style="text-align:left;"><b>Resources & Inspiration</b></h3></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Some of the thinking in this blog was shaped by excellent resources across the industry. If you want to go deeper into the metrics, philosophy, and practical guidance for evaluating AI in security ops, here are some must-reads:</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><ul><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://www.prophetsecurity.ai/blog/soc-metrics-that-matter-mttr-mtti-false-negatives-and-more?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">SOC Metrics That Matter – Prophet Security</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://intezer.com/blog/3-critical-metrics-for-evaluating-ai-soc-solutions-2/?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">3 Critical Metrics for Evaluating AI SOC Solutions – Intezer</a></p></li><li><p class="paragraph" style="text-align:left;"><a class="link" href="https://docs.dropzone.ai/overview/metrics-guide?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">Metrics Guide – Dropzone AI Docs</a></p></li><li><p class="paragraph" style="text-align:left;"><b><a class="link" href="https://www.googlecloudcommunity.com/gc/Community-Blog/The-SOC-Metrics-that-Matter-or-Do-They/ba-p/873173?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">Measuring the SOC: What Counts and What Doesn&#39;t in 2025?</a></b></p></li></ul></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Final Thoughts: Build a System That Thinks </b><i><b>and</b></i><b> Learns</b></h2></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Look, the PICERL Index I&#39;ve laid out here isn&#39;t some magic formula I&#39;m trying to sell you for your next board presentation. Forget generating more charts just to prove your AI isn&#39;t expensive shelfware. My core point is this: as an industry, we <i>have</i> to get serious about measuring the things that genuinely tell us if these AI systems are actually pulling their weight, truly learning, and justifying their often-hefty price tags in a real-world SOC.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">And let&#39;s be brutally honest for a moment – a truth many vendors conveniently gloss over when they’re pushing their latest &#39;AI-powered miracle&#39; – real value from AI in security isn&#39;t found in how many alerts it can auto-close per minute. That’s just sweeping the digital floor faster. Frankly, I don&#39;t give a damn about that kind of speed if the SOC itself isn&#39;t getting demonstrably smarter or more effective as a result.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">What I care about, and what I believe <i>you</i> should be laser-focused on, is whether these sophisticated (and let&#39;s face it, complex) AI tools actually help us cut through the oppressive noise and make sense of the chaos. Can we genuinely <i>trust</i> the decisions they make? Are they actually freeing up our (already overworked and often burnt-out) human analysts to do the proactive hunting and strategic thinking that requires human ingenuity, not just brute-force processing power? If your AI isn&#39;t actively contributing to a SOC that learns, <b>adapts</b>, and demonstrably improves its defenses, ideally week over week, then it risks becoming just another expensive cog in an already overburdened machine, making us <i>feel</i> more efficient while we&#39;re still fundamentally struggling against the tide.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">So, here’s my challenge, or perhaps just my strong opinion: let’s collectively ditch the &#39;dashboard bingo&#39; and stop chasing vanity metrics that make us look busy but don&#39;t prove we&#39;re any better. It&#39;s high time we put our AI investments under a harsher, more critical lens, focusing squarely on whether they&#39;re fostering security operations that can actually <b>evolve</b>.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Building a genuinely smarter SOC isn&#39;t about blindly throwing money at the next shiny AI tool that promises to solve all our problems. It’s about fostering a culture of critical thinking, asking uncomfortable questions, and rigorously measuring genuine progress. And that, unfortunately, is a hell of a lot harder but infinitely more valuable than just counting how many alerts your AI auto-closed by lunchtime.</p></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><hr class="content_break"></div><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;"><b>Still haven’t taken the survey?</b></p><p class="paragraph" style="text-align:left;">Prophet Security is running a short, 8-10 minute survey to better understand how security teams are using AI in the SOC today. The first 100 qualified respondents get a $50 Amazon gift card and early access to the anonymized results.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://qualtricsxm7fx97htf3.qualtrics.com/jfe/form/SV_6fI2jWsksw3P9Z4?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">Take the survey today</a></p><p class="paragraph" style="text-align:left;">Now a closer look at the company behind the survey</p><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: </b><span style="color:#0f3c71;"><b>Prophet Security</b></span></h2><p class="paragraph" style="text-align:left;">Prophet Security is redefining what it means to bring AI into the SOC with purpose and precision. At the center is Prophet AI, an agentic AI SOC Analyst that comes pretrained out of the box and ready to plug into your environment. No months-long onboarding. No brittle logic trees.</p><h3 class="heading" style="text-align:left;"><b>How Prophet AI works</b></h3><p class="paragraph" style="text-align:left;">Unlike traditional automation platforms that rely on playbooks or manual tuning, Prophet AI works autonomously from the moment an alert is triggered. It mirrors the investigative process of a seasoned analyst, asking the right questions, pulling relevant context, and delivering full investigations from day one.</p><p class="paragraph" style="text-align:left;"><b>Plans:</b> Prophet AI builds a dynamic investigation plan for every alert, identifying the key questions needed to determine if it&#39;s a true threat or benign.</p><p class="paragraph" style="text-align:left;"><b>Investigates:</b> It pulls and correlates evidence from SIEM, EDR, IAM, cloud, and more, so your team doesn’t have to. Analysts can dive deeper and ask additional questions, no pivoting or copy-pasting required.</p><p class="paragraph" style="text-align:left;"><b>Responds:</b> Each alert is closed with a clear verdict, context, and next steps. True positives get remediation guidance. False positives yield insights detection engineers can use.</p><p class="paragraph" style="text-align:left;"><b>Adapts:</b> Prophet AI learns from your team’s feedback, improving its performance and adapting to your org’s unique threat landscape.</p><h3 class="heading" style="text-align:left;"><b>Transparency by design</b></h3><p class="paragraph" style="text-align:left;">Every conclusion Prophet AI reaches is traceable and explainable. You can see what it did, why it did it, and how it got there. It’s a trust-building exercise.</p><h3 class="heading" style="text-align:left;"><b>Fast time to value</b></h3><p class="paragraph" style="text-align:left;">Want to see it in action? Most teams spin up a POV in under 30 minutes to evaluate Prophet AI’s real-time performance on their own alerts.</p><p class="paragraph" style="text-align:left;">If you&#39;re ready to transform your SOC with AI that delivers real, measurable impact, Prophet Security provides a clear, fast, and effective way forward. <a class="link" href="https://hubs.ly/Q03d-NlP0?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations" target="_blank" rel="noopener noreferrer nofollow">Request a demo</a> today to see it in action.</p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customize and utilize these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations"><span class="button__text" style=""> Upgrade </span></a></div></div><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>Newsletter Recommendations</b></p><div class="recommendation"><p class="recommendation__sponsored">Sponsored</p><figure class="recommendation__logo"><img alt="SheHacksPurple Newsletter" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/publication/logo/fe803769-5895-4550-afe9-c22bf978aa0f/SHP-monotone.png"/></figure><h3 class="recommendation__title"> SheHacksPurple Newsletter </h3><p class="recommendation__description"> Learn to Code Securely, with Tanya Janca </p><a class="recommendation__link" href="https://magic.beehiiv.com/v1/fe803769-5895-4550-afe9-c22bf978aa0f?boost_send_id=&recommendation_id=9bd8dd7f-4b2a-4a7a-86a3-148ad4a6d18b&utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=measuring-roi-of-ai-agents-in-security-operations"> Subscribe </a></div><p class="paragraph" style="text-align:left;"> </p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=c82c8783-5d66-40d8-8ab7-24cb9f66d3f6&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

      <item>
  <title>Integrating AI Agents into Existing SOC Workflows: Best Practices</title>
  <description>Unlock the secrets of seamlessly integrating AI agents into SOC workflows: navigating the shift from rigid playbooks to intelligent, adaptive security automation strategies.</description>
      <enclosure url="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c870ba0e-2925-42f0-becd-ff5f5b18f802/Integrating_AI_agents_in_SecOps.gif" length="399270" type="image/gif"/>
  <link>https://www.cybersec-automation.com/p/integrating-ai-agents-into-existing-soc-workflows-best-practices-61391cdca6acf83b</link>
  <guid isPermaLink="true">https://www.cybersec-automation.com/p/integrating-ai-agents-into-existing-soc-workflows-best-practices-61391cdca6acf83b</guid>
  <pubDate>Tue, 20 May 2025 16:01:00 +0000</pubDate>
  <atom:published>2025-05-20T16:01:00Z</atom:published>
    <dc:creator>Filip Stojkovski</dc:creator>
    <category><![CDATA[Automation Framework]]></category>
    <category><![CDATA[Automation Playbooks]]></category>
  <content:encoded><![CDATA[
    <div class='beehiiv'><style>
  .bh__table, .bh__table_header, .bh__table_cell { border: 1px solid #C0C0C0; }
  .bh__table_cell { padding: 5px; background-color: #FFFFFF; }
  .bh__table_cell p { color: #2D2D2D; font-family: 'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
  .bh__table_header { padding: 5px; background-color:#F1F1F1; }
  .bh__table_header p { color: #2A2A2A; font-family:'Space Grotesk',Helvetica,Arial,sans-serif !important; overflow-wrap: break-word; }
</style><div class='beehiiv__body'><p class="paragraph" style="text-align:left;"><span style="font-size:0.8rem;"><i>Disclaimer: Opinions expressed are solely my own and do not reflect the views or opinions of my employer or any other affiliated entities. Any sponsored content featured on this blog is independent and does not imply endorsement by, nor relationship with, my employer or affiliated organisations.</i></span></p><p class="paragraph" style="text-align:left;">If you&#39;ve been following the blog, this post is a natural continuation of where we left off in <a class="link" href="https://www.cybersec-automation.com/p/ai-agents-vs-automation-playbooks-4f807401ef07472b?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices" target="_blank" rel="noopener noreferrer nofollow">AI Agents vs. Automation Playbooks</a>. In this piece we dug into the philosophical split between rigid, rule-based playbooks and adaptive, context-aware agents. TL;DR: playbooks are great at executing instructions, but AI agents can <i>think</i>. </p><p class="paragraph" style="text-align:left;">One of the questions I keep getting, and honestly something I’m neck-deep working on right now, is how do we actually transition from classical playbook automation to an autonomous SOC? And here’s the deal: the biggest challenge isn’t tech. It’s finding the right balance. And when I say balance I don’t mean those high-level &quot;strategic framework&quot; slides with five circles and a fancy acronym (guilty as charged, that’s most of what I post). What I mean is: take those frameworks and actually turn them into real, tactical stuff. Use-case breakdowns, step-by-step flows, actual hands-on implementations. That’s how you move from theory to value.</p><p class="paragraph" style="text-align:left;">Like let’s be honest, you’re not going to just swap out your entire phishing playbook with an AI agent and call it a day. It’s not plug-and-play magic. You need to break it down step by step. Map out each stage. Ask: what needs control? What needs judgment?</p><p class="paragraph" style="text-align:left;">That’s also where trust comes in. I’ve heard way too many stories where teams replaced a playbook with an AI agent, ran it once, got mixed results (because duh, nothing just works first try in tech), and then immediately wrote it off as immature tech. The vibe is always, &quot;This sucks, let&#39;s wait a few more years.&quot;</p><p class="paragraph" style="text-align:left;">WRONG.</p><p class="paragraph" style="text-align:left;">What they missed was the process. If you treat it like a drop-in replacement, you’re setting it up to fail. But if you audit the structure of your playbooks, and slowly infuse agents where it makes sense, you&#39;ll get two big wins: 1) gradual, trackable progress, and 2) analyst buy-in, because now they can <i>see</i> where it helps and where human eyes are still needed.</p><p class="paragraph" style="text-align:left;">Done right, you buy analysts back the one thing you can’t scale: time. Done poorly, you add noise, risk, and spark a full-on mutiny in the SOC.</p><hr class="content_break"><p class="paragraph" style="text-align:center;"><b>This edition is sponsored by </b><span style="color:#0f3c71;"><b>Prophet Security</b></span></p><div class="embed"><a class="embed__url" href="https://www.prophetsecurity.ai/?utm_campaign=10763157-Filip%20Stojkovski%20Sponsorship&utm_source=cybersec-automation.com" target="_blank"><div class="embed__content"><p class="embed__title"> Empower your SOC with a Force Multiplier </p><p class="embed__description"> Security alerts overwhelm SOC teams with low-value noise, draining analyst time and slowing response. The result is alert backlogs, analyst fatigue, and missed opportunities to improve security outcomes.<br>Prophet Security’s agentic AI SOC Analyst removes that burden by autonomously triaging and investigating every alert in under three minutes. Analysts stop wasting time on false positives or context switching between disconnected tools. Instead, they focus on higher-value work like threat hunting, incident response, and building better detections.<br><br>See how Prophet AI works &gt; <br></p></div><img class="embed__image embed__image--right" src="https://cdn.prod.website-files.com/66082cf1d4c6684fb536dfbe/67ed7062e5b04684d8185526_Homepage-open-graph-image.png"/></a></div><hr class="content_break"><h2 class="heading" style="text-align:left;" id="strategies-for-seamless-integration">Strategies for Seamless Integration: Start Where It Hurts Most</h2><p class="paragraph" style="text-align:left;">If you’re thinking “Let’s deploy AI across everything,” congrats, you’ve already failed. Don’t boil the ocean. Start with the ugliest, most soul-crushing tasks. Think:</p><ul><li><p class="paragraph" style="text-align:left;">Alert triage in noisy, inconsistent, or context-heavy sources like EDR, user-reported phishing, cloud, or identity setups</p></li><li><p class="paragraph" style="text-align:left;">Context gathering from 5+ tools for every incident</p></li><li><p class="paragraph" style="text-align:left;">Enrichment that analysts always forget to do</p></li></ul><p class="paragraph" style="text-align:left;">Start where the pain is real and measurable. You want fast wins that show the team, “Hey, this isn’t some vendor fantasy. This thing actually helped me go home on time.”</p><p class="paragraph" style="text-align:left;">Tactically, plug agents into existing SOAR playbooks. Replace brittle logic with agent steps that can think, adapt, and yes, decide. Like, swap out that 10-step enrichment chain with a single agent that figures out what data it needs and grabs it. The magic is in the context handling. LLM-powered agents aren’t just smarter bash scripts, they adapt to ambiguity. That’s gold in a SOC.</p><p class="paragraph" style="text-align:left;">Some good examples here. Enrichment playbooks. They’re so simple, but time consuming. Not sure if you had a similar story but for me these have always been a pain. They are simple to build, you get your IOC type, feed them to 5-10 different tools and structure the output.</p><p class="paragraph" style="text-align:left;">These are the playbooks that break quite often (mainly because they rely on so many different integrations, from API changes, to permissioning, to json structure). And if you figured that out, have you tried the ones that run on IM commands? They are even worse, as they rely on user input, just so many random characters or empty spaces for things to go wrong.</p><p class="paragraph" style="text-align:left;">So, simple one—let the agent do this. It will handle these enrichment tasks better, plus it has reasoning and can give you a better verdict on what it finds. Super simple, but it saves tons of time. You can even build your own MCP infra for this if you want to experiment: <a class="link" href="https://mcpmarket.com/server/enrichment?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices" target="_blank" rel="noopener noreferrer nofollow">https://mcpmarket.com/server/enrichment</a></p><p class="paragraph" style="text-align:left;">Or if you want to see how vendors are doing it, check out <a class="link" href="https://hubs.ly/Q03d-NlP0?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices" target="_blank" rel="noopener noreferrer nofollow">Prophet AI</a> (details in the vendor spotlight section).</p><p class="paragraph" style="text-align:left;">Internal Enrichment involves pulling in data from your own systems. You check things like historical provisioning, resource types, and identity data. For example, who did the action, is it an employee or service account, is it normal for them, and where is it happening (asset details, change requests, vuln data)?</p><p class="paragraph" style="text-align:left;">External Enrichment is about threat intel. Check if IPs, accounts, or domains match known bad stuff. IP and domain rep, file hashes, sandbox results, actor TTPs. And don’t just rely on atomic indicators, behavior-based detections are the move.</p><p class="paragraph" style="text-align:left;">Other good use-cases:</p><ul><li><p class="paragraph" style="text-align:left;">Forensic Evidence Collection: file samples, memory and network dumps, properly captured for future investigation or legal.</p></li><li><p class="paragraph" style="text-align:left;">Blast Radius Determination: scan for similar signs across systems, stop lateral movement.</p></li><li><p class="paragraph" style="text-align:left;">Timeline Analysis: piece together what happened, how it moved, and whether the whole alert was even valid. Reinforces feedback loops.</p></li></ul><div class="image"><img alt="" class="image__image" style="" src="https://media.beehiiv.com/cdn-cgi/image/fit=scale-down,format=auto,onerror=redirect,quality=80/uploads/asset/file/c870ba0e-2925-42f0-becd-ff5f5b18f802/Integrating_AI_agents_in_SecOps.gif?t=1747745633"/></div><h2 class="heading" style="text-align:left;" id="train-the-team-not-just-the-model">Train the Team, Not Just the Model</h2><p class="paragraph" style="text-align:left;">Biggest failure I keep seeing? Teams install agents and never train their humans.</p><p class="paragraph" style="text-align:left;">Here’s a hard truth: If your SOC team doesn&#39;t know how to work with AI, you’ve just created more confusion, not less. This isn’t about AI literacy 101. It’s about:</p><ul><li><p class="paragraph" style="text-align:left;"><b>Demystify the Tech</b><br> Run a brown-bag: “How LLMs hallucinate, how playbooks fail, how the agent stitches it together.” Transparency breeds confidence.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Teach Prompting & Delegation</b><br> Analysts should treat the agent like a junior teammate: <i>“Run the malware sandbox playbook on host X and summarize the results.”</i> Good prompts yield gold.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Hands-On Labs</b><br>Spin up lab incidents where the agent proposes actions. Analysts must review, accept, or override, then feed back a verdict. That feedback becomes new training data.<br></p></li><li><p class="paragraph" style="text-align:left;"><b>Formalise the Role: Agent Supervisor</b><br>Certify at least one analyst per shift to tune guardrails, review logs, and champion improvements. This new specialisation turns “AI will take my job” into “AI made me team lead.”<br></p></li></ul><p class="paragraph" style="text-align:left;">Consider designating “agent champions”, analysts who are paid to play, test, and improve agent behaviors. These folks become your AI pit crew. They’re not just analysts; they’re automation engineers in disguise.</p><h2 class="heading" style="text-align:left;" id="pitfalls-expect-the-integration-to-">Pitfalls: Expect the Integration to Punch You in the Face</h2><p class="paragraph" style="text-align:left;">AI agents aren’t silver bullets. They’re landmines and lifesavers, depending on how you use them. And trust me, stuff <i>will </i>go sideways:</p><ul><li><p class="paragraph" style="text-align:left;">APIs change, integrations break (welcome to SecOps dependency hell)</p></li><li><p class="paragraph" style="text-align:left;">Some analysts will straight-up hate them and assume it’s the beginning of job cuts</p></li></ul><p class="paragraph" style="text-align:left;">This isn’t “set it and forget it” territory. You need to build with failure in mind. That means:</p><ul><li><p class="paragraph" style="text-align:left;">Run shadow-mode first. Let the agent observe, suggest, but not act. Log every move.</p></li><li><p class="paragraph" style="text-align:left;">Bake in guardrails: approval workflows, rate limits, version-controlled policy files.</p></li><li><p class="paragraph" style="text-align:left;">Feedback loops: let analysts thumbs up/down outputs and feed that back into tuning.</p></li><li><p class="paragraph" style="text-align:left;">Simulations: test the wild edge cases <i>before</i> prod. Show both the wins and the oopsies.</p></li></ul><p class="paragraph" style="text-align:left;">Let’s go deeper on the common faceplants and how to patch them:</p><p class="paragraph" style="text-align:left;"><b>Opaque Decisions</b></p><p class="paragraph" style="text-align:left;">Fix: Log every single action. <i>&quot;Because the file was tagged malicious by 3/5 engines, I triggered Playbook 42.&quot;</i>Review those logs. Weekly. With the team. Transparency = trust.</p><p class="paragraph" style="text-align:left;"><b>Runaway Automation</b></p><p class="paragraph" style="text-align:left;">Fix: Rate-limit anything that deletes/quarantines/isolates. Anything critical needs a human to hit the green button.</p><p class="paragraph" style="text-align:left;"><b>Data Privacy & Model Leakage</b></p><p class="paragraph" style="text-align:left;">Fix: Self-host the LLM if you can. If not, use a vendor with strong isolation. Mask all PII before sending. Pull in legal from day one so they don’t freak out later.</p><p class="paragraph" style="text-align:left;"><b>Integration Sprawl</b></p><p class="paragraph" style="text-align:left;">Fix: Start small. One data source. One playbook. One shift. Expand only when that stack is rock solid.</p><p class="paragraph" style="text-align:left;"><b>Cultural Resistance</b></p><p class="paragraph" style="text-align:left;">Fix: Share the wins loud and proud. <i>&quot;Agent X closed 1,200 false positives last week.&quot;</i> Make it clear: no one’s getting laid off. People are just leveling up—doing threat hunts, red teaming, building detections.</p><p class="paragraph" style="text-align:left;">Bottom line: this isn’t about flawless tech. It’s about building confidence. If the team doesn’t trust the AI, it won’t matter how smart it is.</p><h1 class="heading" style="text-align:left;" id="change-management-win-the-humans-fi">Change Management: Win the Humans First</h1><p class="paragraph" style="text-align:left;">AI agents don’t fail because of tech. They fail because you didn’t manage people.</p><p class="paragraph" style="text-align:left;">This is about trust, culture, and showing your team that this isn’t a flashy experiment—it’s a partnership.</p><ul><li><p class="paragraph" style="text-align:left;">Inclusive Design – Get your analysts in the loop early. Let them help pick the use cases, write the guardrails, and tear apart the results. If they build it, they’re more likely to trust it.</p></li><li><p class="paragraph" style="text-align:left;">Quick Wins – Brag a little. Celebrate the first phishing alert contained autonomously. Share the Slack thread when the alert flood dropped 70%. One team literally said, “Our analyst on call slept through the night—for the first time this quarter.” That’s not a metric, that’s a vibe.</p></li><li><p class="paragraph" style="text-align:left;">Transparent Guardrails – Don’t just say it’s safe. Publish the policies. Show them what’s blocked, where human approvals kick in, and what the agent won’t touch. This kind of psychological safety flips skeptics into believers.</p></li><li><p class="paragraph" style="text-align:left;">Iterative Rollout – Use release rings. Start with low-risk endpoints, then move to workstations, then production servers, then crown jewels. Every successful ring gives you more credibility and more buy-in.</p></li><li><p class="paragraph" style="text-align:left;">Make It Personal – Let analysts name the agent. (No joke, we had one named “ClippyButSmarter.”) Internal branding helps.</p></li><li><p class="paragraph" style="text-align:left;">Pilot Over Platform – Start with a scoped trial, not a 6-month roadmap. Let the results do the selling.</p></li></ul><p class="paragraph" style="text-align:left;">Make it collaborative. Make it transparent. Make it feel like something you’d want to use, not something that’s being forced on you.</p><h1 class="heading" style="text-align:left;" id="closing-thoughts">Closing Thoughts</h1><p class="paragraph" style="text-align:left;">Stacking playbooks, co-pilots, and autonomous agents isn’t about picking one winner, it’s about building a team. You create a SOC where machines do what machines do best, speed, scale, and repetition,while humans double down on what <i>we</i> do best: judgment, creativity, and strategy.</p><ol start="1"><li><p class="paragraph" style="text-align:left;">Playbooks swarm the routine.</p></li><li><p class="paragraph" style="text-align:left;">Co-pilots make sense of messy data and tell the story.</p></li><li><p class="paragraph" style="text-align:left;">Agents decide, coordinate, and escalate.</p></li></ol><p class="paragraph" style="text-align:left;">This is how you scale without burning out your team. With shadow-mode pilots, policy-as-code guardrails, and a solid change-management plan, you can roll out this triad safely, transforming your SOC from reactive firefighting to proactive threat eradication.</p><p class="paragraph" style="text-align:left;"><b>Start small. Stack smart. Iterate fast.</b></p><hr class="content_break"><div class="section" style="background-color:transparent;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><h2 class="heading" style="text-align:left;"><b>Vendor Spotlight: </b><span style="color:#0f3c71;"><b>Prophet Security</b></span></h2><p class="paragraph" style="text-align:left;"><a class="link" href="https://hubs.ly/Q03d-NlP0?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices" target="_blank" rel="noopener noreferrer nofollow">Prophet Security</a> is redefining what it means to bring AI into the SOC with purpose and precision. At the center is Prophet AI, an agentic AI SOC Analyst that comes pretrained out of the box and ready to plug into your environment. No months-long onboarding, no brittle logic trees. </p><h2 class="heading" style="text-align:left;">How Prophet AI Works</h2><p class="paragraph" style="text-align:left;">Unlike traditional automation platforms that require playbooks or manual tuning, Prophet AI works autonomously from the moment an alert is triggered, mimicking the thought process of an expert analyst in how it works. Prophet AI connects with the tools you already rely on, including identity, endpoint, cloud, email, SIEM, threat feeds, data lakes, and more, and starts delivering full-context investigations from day one. </p><p class="paragraph" style="text-align:left;"><b>Plans</b>: Prophet AI analyzes every alert, extracts key details, and builds a dynamic investigation plan, just like an expert analyst would. It identifies the right questions to ask to determine whether the alert is true positive or benign.</p><p class="paragraph" style="text-align:left;"><b>Investigates</b>: Prophet AI goes beyond basic enrichment to autonomously execute a full investigation for every alert, querying your SIEM, security data lake, EDR, IAM, and other tools to collect, correlate, and interpret evidence. It provides all the underlying evidence to ensure transparency and trust. And when your team wants to dig deeper? They can pivot, question, and explore within the same investigation. No swivel chair or wasted motion.</p><p class="paragraph" style="text-align:left;"><b>Responds</b>: Prophet AI completes each investigation with a clear verdict, assigns severity, and surfaces only what truly demands attention. It provides remediation steps for true positive alerts while offering tuning insights for detection engineers for noise detections. Prophet AI plugs into your case management and collaboration tools, fitting directly into how your team already operates.</p><p class="paragraph" style="text-align:left;"><b>Adapts</b>: Prophet AI gets smarter with every investigation. It learns from analyst feedback and adapts to how an organization evaluates threats, refining its judgment to reflect each environment, its risk posture, and what matters most to the team.</p><h2 class="heading" style="text-align:left;">Prophet AI’s approach to transparency and control</h2><p class="paragraph" style="text-align:left;">Customers can choose their level of autonomy—from full hands-off investigations to a supervised model where Prophet AI does the analysis and your team makes the call. </p><p class="paragraph" style="text-align:left;">Every step Prophet AI takes is fully transparent. Its reasoning is surfaced alongside its conclusions so you always know what it did, why it did it, and how it got there. That level of explainability builds trust quickly and keeps it.</p><h2 class="heading" style="text-align:left;">Fast time to value</h2><p class="paragraph" style="text-align:left;">One of the fastest paths to value is running a live proof of value (POV) with Prophet AI. In under 30 minutes, customers can see exactly how the AI handles real alerts in their environment. It’s the most direct way to evaluate accuracy, coverage, and the potential uplift to your team’s capacity. </p><p class="paragraph" style="text-align:left;">For teams ready to move beyond rigid automation and into AI-native operations, Prophet Security offers a clear path forward. It&#39;s not just faster investigation, it’s a fundamentally better way to scale security operations with confidence.</p><p class="paragraph" style="text-align:left;"><a class="link" href="https://hubs.ly/Q03d-NlP0?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices" target="_blank" rel="noopener noreferrer nofollow">Request a demo today</a> to see Prophet AI in action.</p></div><hr class="content_break"><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><table width="100%" class="bh__column_wrapper"><tr><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🏷️  <b>Blog Sponsorship</b></p><p class="paragraph" style="text-align:left;">Want to sponsor a future edition of the Cybersecurity Automation Blog? Reach out to start the conversation. 🤝</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/c/sponsor?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices"><span class="button__text" style=""> Sponsorship details </span></a></div></td><td width="50%" class="bh__column"><p class="paragraph" style="text-align:center;">🗓️  <b>Request a Services Call</b></p><p class="paragraph" style="text-align:left;"><i>If you want to get on a call and have a discussion about security automation, you can book some time here</i></p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://calendly.com/cybersec-automation?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices"><span class="button__text" style=""> Book a call </span></a></div></td></tr></table></div><p class="paragraph" style="text-align:left;"></p><div class="section" style="background-color:#E6F0FA;border-color:#222222;border-style:dashed;border-width:1px;margin:0.0px 0.0px 0.0px 0.0px;padding:0.0px 0.0px 0.0px 0.0px;"><p class="paragraph" style="text-align:left;">Join as a top supporter of our blog to get special access to the latest content and help keep our community going.</p><p class="paragraph" style="text-align:left;">As an added benefit, each <b>Ultimate Supporter will receive a link to the editable versions of the visuals used in our blog posts.</b> This exclusive access allows you to customise and utilise these resources for your own projects and presentations.</p><div class="button" style="text-align:center;"><a target="_blank" rel="noopener nofollow noreferrer" class="button__link" style="" href="https://www.cybersec-automation.com/upgrade?utm_source=www.cybersec-automation.com&utm_medium=newsletter&utm_campaign=integrating-ai-agents-into-existing-soc-workflows-best-practices"><span class="button__text" style=""> Upgrade </span></a></div></div><p class="paragraph" style="text-align:left;"></p><p class="paragraph" style="text-align:left;"></p></div><div class='beehiiv__footer'><br class='beehiiv__footer__break'><hr class='beehiiv__footer__line'><a target="_blank" class="beehiiv__footer_link" style="text-align: center;" href="https://www.beehiiv.com/?utm_campaign=424651a8-2eca-4100-9e33-917b0e9e708d&utm_medium=post_rss&utm_source=secops_unpacked">Powered by beehiiv</a></div></div>
  ]]></content:encoded>
</item>

  </channel>
</rss>
