
Created by way of John Tuckner and the staff at automation and AI-powered workflow platform Tines, the SOC Automation Capacity Matrix (SOC ACM) is a collection of tactics designed to lend a hand safety operations groups perceive their automation functions and reply extra successfully to incidents.
A customizable, vendor-agnostic device that includes lists of automation alternatives, it is been shared and really helpful by way of individuals of the safety group since its release in January 2023, particularly by way of Airbnb engineer Allyn Stott in his BSides and Black Hat communicate, How I Discovered to Prevent Being concerned and Construct a Trendy Detection & Reaction Program.
The SOC ACM has been in comparison to the MITRE ATT&CK and RE&CT frameworks, with one consumer pronouncing, “it can be a same old for classification of SOAR automations, a little bit just like the RE&CT framework, however with extra automation focal point.” It is been utilized by organizations in Fintech, Cloud Safety, and past, as a foundation for assessing and optimizing their safety automation systems.
Right here, we will take a more in-depth take a look at how the SOC ACM works, and proportion how you’ll be able to use it for your group.

What’s the SOC Automation Capacity Matrix?
The SOC Automation Capacity Matrix is an interactive set of tactics that empower safety operations groups to reply proactively to not unusual cybersecurity incidents.
It is not an inventory of particular use circumstances associated with anyone services or products, however a strategy to take into consideration the functions a company may apply.
It provides a forged basis for newbies to know what is conceivable with safety automation. For extra complex systems, it serves as a supply of inspiration for long term implementations, a device to gauge good fortune, and a way to record results.
Whilst the device is vendor-agnostic, it pairs smartly with a platform like Tines, which was once evolved by way of safety practitioners to lend a hand fellow safety practitioners support their mission-critical processes via workflow automation and AI

How does the SOC Automation Capacity Matrix paintings?
The SOC ACM is divided into classes that include automation functions.
Every capacity contains:
- Description – a temporary evaluation of what the potential is doing
- Ways – technology-agnostic concepts for find out how to enforce the potential
- Examples – related workflow templates from the Tines library
- References – different analysis contributing to the potential
The framework reads from left to proper and most sensible to backside inside of classes. Whilst it’s minimally opinionated about which functions deliver essentially the most price or are more uncomplicated to enforce, the framework is adaptable to what organizations in finding Most worthy.
Every capacity can stand on my own within the matrix, however becoming a member of many functions in combination can produce many extra complicated and impactful results.
Methods to use the SOC Automation Capacity Matrix
Subsequent, we will illustrate find out how to use the SOC ACM, taking phishing reaction as our instance. Many organizations make the most of a couple of tactics to seek out and analyze suspicious messages to reply as it should be to malicious emails.
To start out, listed below are some processes a regimen phishing investigation may come with:
- Obtain a phishing electronic mail or alert
- Ship a notification to the safety staff for processing
- Create a price ticket to trace and report the research
- Assessment the weather of the e-mail, together with attachments, hyperlinks, and electronic mail message headers
- If suspicious, delete the e-mail and upload options to blocklists
- Ship a notification to the recipient with a standing replace
Throughout the matrix capacity, Phishing Signals seem within the Alert Dealing with phase; it mentions that many organizations enforce gear like electronic mail safety gateways to forestall suspicious emails from being brought to inboxes whilst additionally producing indicators of assault campaigns which may be computerized.

The potential additionally outlines a solution to create a useful inbox for customers to simply ahead phishing emails that can have handed throughout the filters. Imposing either one of those functions provides a possibility to start an automation workflow.
As soon as a suspicious message has been recognized, both throughout the consumer reporting or generated alert, extra automation functions transform to be had. One advice is to create a location for monitoring the lifecycle of every alert once conceivable.
Using the Monitoring Location capacity within the Factor Monitoring phase, we will be able to establish the place those indicators must be recorded, up to date, and reported. Understand how the workflow has now moved between sections of the Automation Capacity Matrix to increase the method.

With the alert and monitoring location determined on, we will be able to transfer in opposition to appearing a radical research of the phishing alert in query. Phishing emails frequently include doubtlessly malicious attachments and suspicious hyperlinks to seize authentication subject matter and are usually despatched from spoofed assets.
Transferring into the Enrichment segment, we need to focal point on using a couple of key functions at a minimal: Area Research for any hyperlinks provide within the electronic mail frame, Report Hash Research/Report Research to have a look at any attachments to the e-mail, and E mail Attributes to seem deeper into electronic mail headers for indicators of emails from spoofed addresses.
For Enrichment alternatives, the collection of choices for API-driven gear and services and products that can be utilized to supply those functions grows exponentially. Some not unusual choices come with VirusTotal for information, URLscan for domain names, and EmailRep for sender data. Every of those enrichment effects will also be recorded within the related monitoring location recognized prior to now to record the results and supply analysts with a view into the effects.
This presentations what number of functions from the similar phase will also be implemented to the similar automation workflow, on this case, to supply as a lot data as conceivable to analysts.

After enrichment happens, a verdict may well be reached already, however much more likely, the problem would require a snappy overview from an analyst. At this level, the Person Interplay phase turns into severe.
To start out, we will be able to use Chat Signals to inform the safety staff in a Slack channel {that a} phishing electronic mail has arrived and a monitoring factor has been created, with quite a lot of enrichment main points added as further context is in a position for overview.
That looks after informing the safety staff, however what about updating any customers who may well be impacted or who reported the e-mail? Phishing reaction processes, specifically, are distinctive as a result of many organizations actively educate customers to record emails they may establish as suspicious. Informing those customers with a assured verdict inside of a brief time-frame is an effective way to empower operations equivalent to getting delicate paperwork signed briefly or combating mass malware outbreaks.
To try this, we will be able to use the Person Notification capacity to spot the consumer who reported the e-mail and supply them with the result of the e-mail research. On the subject of Person Interplay, it isn’t best about further notification of the safety staff but in addition extending the achieve and empowering others with real-time data to make the proper selections.

At this level, numerous process has taken position, and we’ve numerous wisdom at our disposal. Whilst additional info is at all times useful, performing on it as it should be is what in the end counts maximum, ensuing within the remediation segment. Lots of the knowledge issues (signs) we accumulated prior to can be utilized for remediation motion. Relying on how the location has performed out, shall we take probably the most following steps:
- Area blocklist: Upload any domain names and URLs recognized as suspicious to a blocklist.
- Report hash blocklist: Upload any document hashes recognized as malicious to a blocklist.
- E mail deletion: Take away emails associated with an assault marketing campaign from inboxes.
- Password invalidation: Alternate the passwords of any customers discovered to have submitted credentials to a phishing website online.

The important thing to any remediation is understanding what is conceivable and beginning small, particularly when using automation to construct self assurance. A method to try this is to supply hyperlinks or buttons that wish to be manually clicked to take remediation movements, however in a repeatable method. If you wish to introduce complete automation, holding lists of suspicious domain names that may be blocked offers you nice software, minor chance, and will also be fastened briefly with little total affect when mistakes happen.
Taking a look on the procedure end-to-end, we’ve applied the next functions to lend a hand automate severe movements for plenty of cybersecurity groups:
- Phishing indicators
- Monitoring location
- Report hash research
- Area research
- E mail attributes
- Chat indicators
- Person notification
- Area blocklist
- Report hash blocklist
- E mail deletion
- Password invalidation
A vital advantage of growing those functions for your group to deal with a unmarried procedure, equivalent to phishing, is that many of those functions at the moment are to be had to be reused for extra functions like malware detection or dealing with suspicious logins, making every next automation alternative more uncomplicated.

Customizing the matrix
The SOC ACM could also be to be had on GitHub for many who wish to run it themselves or give a contribution.
This fashion, the SOC ACM will also be totally custom designed to suit your wishes. This comprises:
- Including new classes and functions
- Reorganizing in step with your priorities
- Monitoring automation workflows that align with those functions
- Exporting the configuration
- Darkish and lightweight mode
You’ll additionally assess other environments or other organizations another way by way of developing separate forums. As an example, if your company acquires an organization with other functions from yours, you’ll be able to use the matrix to visualise that setting totally another way.
All of this configuration will also be saved in the community for your browser for privateness. In addition to exporting the configuration, you’ll be able to import it to restore previous checks, all with no login account, and with none monitoring.
The SOC ACM as a reporting device
Groups having access to the SOC ACM on GitHub too can use the matrix to visually exhibit the place they’re of their automation adventure and keep in touch the price in their automation program to management and different key stakeholders.
Quickly after imposing a couple of functions, groups will perceive which functions they are using maximum, the related actions, and their price, equivalent to time stored or diminished reaction time. This allows them to proportion effects with related groups and make a decision what to prioritize subsequent.
Case find out about: monitoring time stored and executions to turn price with the SOC ACM
On the Tines Roadshow: San Francisco, the author of the SOC Automation Capacity Matrix, John Tuckner, shared how he labored with a Fintech corporate to evaluate and support their automation program the usage of the matrix. They instructed Tuckner, “The Automation Capacity Matrix is helping us prepare our workflows, establish which workflows are saving us essentially the most time, and spotlight long term spaces of alternative.”
Highlights:
- 25 functions applied and tagged
- 10 workflows using Slack slash instructions with 2,000 executions
- Ship multifactor suggested workflows ran 721 occasions for six.5 hours of time financial savings monthly
Suggestions:
- Take a look at managing lists of IOCs for reaction functions, “IP record,” “area record,” and “hash record.”
- Record and spotlight the efforts made in time stored when using case control.
Long term state – what they’re going to do another way:
- Tackling dispensed alerting, consumer interplay by the use of Slack
- Person notification
- Person reaction
- Updating safety Slack channel and incident reporting to make use of a Slack bot and course studies and asks to the proper subteam
- Notify emergency sources
- Timed escalations
- Slash instructions
- Upload extra reaction movements by the use of Tines automation via our Slack bot
- Artifact collecting
- Disabling MFA instrument
- Asset look up (no longer simply endpoints, wish to come with cloud property)
The SOC Automation Capacity Matrix is an invaluable useful resource for groups in any respect levels of their automation adventure, offering inspiration for his or her subsequent automation builds and a way to evaluate their automation program.
If you need to discover the SOC Automation Capacity Matrix in additional element, you can in finding it on Perception, hosted by way of the Tines staff.