Operational runbooks for rapid detection and automated response, tailored to each Sphere of Influence—Private, Social, and Public. Each playbook follows zero‑trust principles: verify explicitly, enforce least privilege, protect data by design.
Overview
Map common detections to their SoI‑specific response automation.
Detection | Private | Social | Public |
---|---|---|---|
Credential compromise / impossible travel | Lock account, revoke tokens, device quarantine | Suspend guest, isolate session, owner notified | N/A (anonymous) — rate-limit abuse, block IP ASN |
Mass download / exfil attempt | Throttle, watermark, DLP block, start egress capture | Pause share, watermark, require owner approval | Bot flag, require step-up for writes, CDN shield |
Data mis-share (wrong audience) | Auto revoke, rotate link, notify record owners | Recall + expire links, tenant audit, attest identity | Takedown pipeline if published |
Bot/abuse surge | N/A | N/A | WAF rules, bot mgmt, challenge pages, community queue |
Private SoI
Triggered by impossible travel, atypical MFA patterns, or session anomaly risk ≥ threshold in Private SoI.
Objective
Containment
Revoke tokens, force sign‑out, kill active sessions, disable new device enrollments.
Forensics
Snapshot session metadata, preserve logs, export to SIEM, tag case ID.
Comms
Notify user + manager, open incident in ticketing, post #security channel.
Auto-contain account
Risk‑based step‑up
Evidence capture
Human approval gates
Post‑incident actions
Public SoI
Triggered by sudden spikes, credential stuffing signatures, or malicious user‑generated content.
Objective
Edge defenses
Tighten WAF rules, enable challenge pages, block abusive ASNs, raise rate limits.
Detection tuning
Feed threat intel; fingerprint bot patterns; protect write endpoints with step‑up.
Community ops
Queue moderation; auto‑takedown defacements with approval trail.
Mitigate at the edge
Protect data & privacy
Content moderation
After‑action
Operations
All automation is gated by human approvals where appropriate and logged immutably.
Approval gates
Core metrics
Get started
Wire these playbooks to your SIEM, IdP, EDR, and CDN. We provide adapters and reference policies for rapid deployment.