XRDNA Logo
  • Login
menu

SOAR Playbooks (SoI‑Aligned)

Operational runbooks for rapid detection and automated response, tailored to each Sphere of Influence—Private, Social, and Public. Each playbook follows zero‑trust principles: verify explicitly, enforce least privilege, protect data by design.

Zero Trust by contextAutomation with approvalsThreat‑informed

Overview

Event → Playbook matrix

Map common detections to their SoI‑specific response automation.

DetectionPrivateSocialPublic
Credential compromise / impossible travelLock account, revoke tokens, device quarantineSuspend guest, isolate session, owner notifiedN/A (anonymous) — rate-limit abuse, block IP ASN
Mass download / exfil attemptThrottle, watermark, DLP block, start egress capturePause share, watermark, require owner approvalBot flag, require step-up for writes, CDN shield
Data mis-share (wrong audience)Auto revoke, rotate link, notify record ownersRecall + expire links, tenant audit, attest identityTakedown pipeline if published
Bot/abuse surgeN/AN/AWAF rules, bot mgmt, challenge pages, community queue

Private SoI

Playbook: Suspected credential compromise

Triggered by impossible travel, atypical MFA patterns, or session anomaly risk ≥ threshold in Private SoI.

Objective

Private SoIMTTD ≤ 2mMTTR ≤ 15m

Containment

Revoke tokens, force sign‑out, kill active sessions, disable new device enrollments.

Forensics

Snapshot session metadata, preserve logs, export to SIEM, tag case ID.

Comms

Notify user + manager, open incident in ticketing, post #security channel.

1

Auto-contain account

  • Disable refresh tokens; revoke OAuth grants.
  • Rotate app secrets for high‑risk scopes.
  • Quarantine managed device if EDR risk ≥ medium.
2

Risk‑based step‑up

  • Require passkey re‑auth and phishing‑resistant MFA.
  • Block legacy protocols; enforce mTLS.
3

Evidence capture

  • Export auth logs, IPs, user agent, geo.
  • Hash + store artifacts; link to case.
4

Human approval gates

  • Security reviewer confirms identity re‑proof.
  • Re‑enable account; monitor 24h with heightened alerts.
5

Post‑incident actions

  • Rotate long‑lived credentials.
  • Update detections if gap identified.
  • Close with root cause + lessons learned.

Social SoI

Playbook: Suspicious mass download / exfil

Triggered by burst downloads from guest account, unusual hours, or high‑risk region.

Objective

Social SoIMTTD ≤ 5mMTTR ≤ 20m

Scope down

Expire share‑scoped links, downgrade permissions to view‑only, watermark active sessions.

Isolate session

Switch to browser isolation or VDI; throttle egress; geo fence.

Owner notify

Alert resource owners; require one‑click approve/deny to continue.

1

Pause risky activity

  • Throttle downloads; force watermark overlays.
  • Temporarily suspend guest if anomaly persists.
2

Validate identity & intent

  • Step‑up auth; require business justification in banner.
  • Route to owner approval for continued access.
3

Audit & evidence

  • Snapshot list of files, sizes, and timestamps.
  • Attach session replay if available.
4

Remediate shares

  • Recall mis‑shares; rotate links; enforce labels.
  • Auto‑deprovision on contract end/inactivity.
5

Close & monitor

  • Owner attests outcome; SOC monitors next 48h.
  • Implement new throttle baseline if needed.

Public SoI

Playbook: Bot / abuse surge

Triggered by sudden spikes, credential stuffing signatures, or malicious user‑generated content.

Objective

Public SoIMTTD ≤ 1mMTTR ≤ 10m

Edge defenses

Tighten WAF rules, enable challenge pages, block abusive ASNs, raise rate limits.

Detection tuning

Feed threat intel; fingerprint bot patterns; protect write endpoints with step‑up.

Community ops

Queue moderation; auto‑takedown defacements with approval trail.

1

Mitigate at the edge

  • Enable CDN shield; escalate bot score threshold.
  • Block Tor/known bad IP ranges temporarily.
2

Protect data & privacy

  • Minimize logging of PII; honor regional consent signals.
  • Rotate public API keys; enforce per‑IP quotas.
3

Content moderation

  • Auto‑takedown defaced pages with rollback.
  • Escalate to human review for borderline content.
4

After‑action

  • Share indicators with partners; update WAF/bot rules.
  • Report metrics and document lessons learned.

Operations

Governance, approvals, and metrics

All automation is gated by human approvals where appropriate and logged immutably.

Approval gates

  • Risk‑tiered actions: Contain (auto), Restrict (1 approver), Disable (2 approvers).
  • Owner‑in‑the‑loop for Social shares; SOC duty officer for Private actions.
  • All approvals recorded with signer identity and timestamp.

Core metrics

MTTDMTTRContainment TimeFalse Positive RateUser ImpactedData at Risk

Get started

Automate your SoI‑aware security response

Wire these playbooks to your SIEM, IdP, EDR, and CDN. We provide adapters and reference policies for rapid deployment.

Talk to an expertDownload reference YAMLDownload reference JSON
© 2025 XRDNA. All rights reserved.
MatrixGovernancePrivateSocialPublic
eVa Logo
Solutions
  • radio_button_checkedeVa
  • manage_searchNeural Voyager
  • roomMoE
  • circleSoI
  • squareNMP
Industries
  • location_citySpace Domain
  • cast_for_educationLogistics
  • location_cityHospitality
  • groupsTraining
  • mediationWarfighting
  • mediationCyber
  • location_cityGaming
  • location_cityCommercial
  • houseConsumer
  • sensor_occupiedGovernment + Defense
Resources
  • groupseVa Tech Spec
  • online_predictionNMP Tech Spec
  • policySoI SOAR Playbook
  • online_predictionWhitepapers
  • online_predictionPatents
About
  • groupsCompany
  • policyPrivacy Policy
  • contact_pageContact
XRDNA, MoE, Map of Everything, eVa, Sphere of Influence, and Neural Voyager are all registered trademarks for XRDNA Inc
2025 XRDNA, Inc. All Rights Reserved.