By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: How to Use Tines’s SOC Automation Capability Matrix
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > How to Use Tines’s SOC Automation Capability Matrix
Tech News

How to Use Tines’s SOC Automation Capability Matrix

By Viral Trending Content 15 Min Read
Share
SHARE
SOC Automation

Created by John Tuckner and the team at automation and AI-powered workflow platform Tines, the SOC Automation Capability Matrix (SOC ACM) is a set of techniques designed to help security operations teams understand their automation capabilities and respond more effectively to incidents.

Contents
What is the SOC Automation Capability Matrix?How does the SOC Automation Capability Matrix work? How to use the SOC Automation Capability MatrixCustomizing the matrixThe SOC ACM as a reporting toolCase study: tracking time saved and executions to show value with the SOC ACM

A customizable, vendor-agnostic tool featuring lists of automation opportunities, it’s been shared and recommended by members of the security community since its launch in January 2023, notably by Airbnb engineer Allyn Stott in his BSides and Black Hat talk, How I Learned to Stop Worrying and Build a Modern Detection & Response Program.

The SOC ACM has been compared to the MITRE ATT&CK and RE&CT frameworks, with one user saying, “it could be a standard for classification of SOAR automations, a bit like the RE&CT framework, but with more automation focus.” It’s been used by organizations in Fintech, Cloud Security, and beyond, as a basis for assessing and optimizing their security automation programs.

Here, we’ll take a closer look at how the SOC ACM works, and share how you can use it in your organization.

SOC Automation

What is the SOC Automation Capability Matrix?

The SOC Automation Capability Matrix is an interactive set of techniques that empower security operations teams to respond proactively to common cybersecurity incidents.

It’s not a list of specific use cases related to any one product or service, but a way to think about the capabilities an organization might follow.

It offers a solid foundation for beginners to understand what’s possible with security automation. For more advanced programs, it serves as a source of inspiration for future implementations, a tool to gauge success, and a means to report outcomes.

While the tool is vendor-agnostic, it pairs well with a platform like Tines, which was developed by security practitioners to help fellow security practitioners enhance their mission-critical processes through workflow automation and AI

SOC Automation

How does the SOC Automation Capability Matrix work?

The SOC ACM is split into categories that contain automation capabilities.

Each capability comprises:

  • Description – a brief overview of what the capability is doing
  • Techniques – technology-agnostic ideas for how to implement the capability
  • Examples – relevant workflow templates from the Tines library
  • References – other research contributing to the capability

The framework reads from left to right and top to bottom within categories. While it is minimally opinionated about which capabilities bring the most value or are easier to implement, the framework is adaptable to what organizations find most valuable.

Each capability can stand alone in the matrix, but joining many capabilities together can produce many more complex and impactful outcomes.

How to use the SOC Automation Capability Matrix

Next, we’ll illustrate how to use the SOC ACM, taking phishing response as our example. Many organizations utilize multiple techniques to find and analyze suspicious messages to respond appropriately to malicious emails.

To start, here are some processes a routine phishing investigation might include:

  1. Receive a phishing email or alert
  2. Send a notification to the security team for processing
  3. Create a ticket to track and record the analysis
  4. Review the elements of the email, including attachments, links, and email message headers
  5. If suspicious, delete the email and add features to blocklists
  6. Send a notification to the recipient with a status update

Within the matrix capability, Phishing Alerts appear in the Alert Handling section; it mentions that many organizations implement tools like email security gateways to prevent suspicious emails from being delivered to inboxes while also generating alerts of attack campaigns that could be automated.

SOC Automation

The capability also outlines a strategy to create a purposeful inbox for users to easily forward phishing emails that may have passed through the filters. Implementing both of these capabilities offers an opportunity to begin an automation workflow.

Once a suspicious message has been identified, either through the user reporting or generated alert, more automation capabilities become available. One recommendation is to create a location for tracking the lifecycle of each alert as soon as possible.

Utilizing the Tracking Location capability in the Issue Tracking section, we can identify where these alerts should be recorded, updated, and reported. Notice how the workflow has now moved between sections of the Automation Capability Matrix to extend the process.

SOC Automation

With the alert and tracking location decided on, we can move towards performing a thorough analysis of the phishing alert in question. Phishing emails commonly contain potentially malicious attachments and suspicious links to capture authentication material and are typically sent from spoofed sources.

Moving into the Enrichment phase, we want to focus on utilizing a few key capabilities at a minimum: Domain Analysis for any links present in the email body, File Hash Analysis/File Analysis to look at any attachments to the email, and Email Attributes to look deeper into email headers for signs of emails from spoofed addresses.

For Enrichment opportunities, the number of options for API-driven tools and services that can be used to provide these capabilities grows exponentially. Some common options include VirusTotal for files, URLscan for domains, and EmailRep for sender information. Each of these enrichment results can be recorded in the associated tracking location identified previously to document the outcomes and provide analysts with a view into the results.

This shows how many capabilities from the same section can be applied to the same automation workflow, in this case, to provide as much information as possible to analysts.

SOC Automation

After enrichment occurs, a verdict might be reached already, but more likely, the issue will require a quick review from an analyst. At this point, the User Interaction section becomes critical.

To start, we can use Chat Alerts to notify the security team in a Slack channel that a phishing email has arrived and a tracking issue has been created, with various enrichment details added as additional context is ready for review.

That takes care of informing the security team, but what about updating any users who might be impacted or who reported the email? Phishing response processes, in particular, are unique because many organizations actively train users to report emails they might identify as suspicious. Informing these users with a confident verdict within a short timeframe is a great way to empower operations such as getting sensitive documents signed quickly or preventing mass malware outbreaks.

To do this, we can use the User Notification capability to identify the user who reported the email and provide them with the results of the email analysis. In the case of User Interaction, it’s not only about additional notification of the security team but also extending the reach and empowering others with real-time information to make the right decisions.

SOC Automation

At this point, a lot of activity has taken place, and we have a lot of knowledge at our disposal. While more information is always helpful, acting on it appropriately is what ultimately counts most, resulting in the remediation phase. Many of the data points (indicators) we gathered before can be used for remediation action. Depending on how the situation has played out, we could take some of the following steps:

  • Domain blocklist: Add any domains and URLs identified as suspicious to a blocklist.
  • File hash blocklist: Add any file hashes identified as malicious to a blocklist.
  • Email deletion: Remove emails related to an attack campaign from inboxes.
  • Password invalidation: Change the passwords of any users found to have submitted credentials to a phishing website.
SOC Automation

The key to any remediation is knowing what’s possible and starting small, especially when utilizing automation to build confidence. One way to do this is to provide links or buttons that need to be manually clicked to take remediation actions, but in a repeatable manner. If you want to introduce full automation, keeping lists of suspicious domains that can be blocked provides you with great utility, minor risk, and can be fixed quickly with little overall impact when errors occur.

Looking at the process end-to-end, we have utilized the following capabilities to help automate critical actions for many cybersecurity teams:

  • Phishing alerts
  • Tracking location
  • File hash analysis
  • Domain analysis
  • Email attributes
  • Chat alerts
  • User notification
  • Domain blocklist
  • File hash blocklist
  • Email deletion
  • Password invalidation

A significant benefit of developing these capabilities in your organization to address a single process, such as phishing, is that many of these capabilities are now available to be reused for additional purposes like malware detection or handling suspicious logins, making each subsequent automation opportunity easier.

SOC Automation

Customizing the matrix

The SOC ACM is also available on GitHub for those who prefer to run it themselves or contribute.

This way, the SOC ACM can be fully customized to fit your needs. This includes:

  • Adding new categories and capabilities
  • Reorganizing according to your priorities
  • Tracking automation workflows that align with these capabilities
  • Exporting the configuration
  • Dark and light mode

You can also assess different environments or different organizations differently by creating separate boards. For example, if your organization acquires a company with different capabilities from yours, you can use the matrix to visualize that environment completely differently.

All of this configuration can be stored locally in your browser for privacy. As well as exporting the configuration, you can import it to revive past assessments, all without a login account, and without any tracking.

The SOC ACM as a reporting tool

Teams accessing the SOC ACM on GitHub can also use the matrix to visually demonstrate where they are in their automation journey and communicate the value of their automation program to leadership and other key stakeholders.

Soon after implementing a few capabilities, teams will understand which capabilities they’re utilizing most, the associated activities, and their value, such as time saved or reduced response time. This enables them to share results with relevant teams and decide what to prioritize next.

Case study: tracking time saved and executions to show value with the SOC ACM

At the Tines Roadshow: San Francisco, the creator of the SOC Automation Capability Matrix, John Tuckner, shared how he worked with a Fintech company to assess and enhance their automation program using the matrix. They told Tuckner, “The Automation Capability Matrix helps us organize our workflows, identify which workflows are saving us the most time, and highlight future areas of opportunity.”

Highlights:

  • 25 capabilities implemented and tagged
  • 10 workflows utilizing Slack slash commands with 2,000 executions
  • Send multifactor prompt workflows ran 721 times for 6.5 hours of time savings per month

Recommendations:

  • Look at managing lists of IOCs for response capabilities, “IP list,” “domain list,” and “hash list.”
  • Document and highlight the efforts made in time saved when utilizing case management.

Future state – what they’ll do differently:

  • Tackling distributed alerting, user interaction via Slack
    • User notification
    • User response
  • Updating security Slack channel and incident reporting to use a Slack bot and route reports and asks to the correct subteam
    • Notify emergency resources
    • Timed escalations
    • Slash commands
  • Add more response actions via Tines automation through our Slack bot
    • Artifact gathering
    • Disabling MFA device
    • Asset lookup (not just endpoints, need to include cloud assets)

The SOC Automation Capability Matrix is a useful resource for teams at all stages in their automation journey, providing inspiration for their next automation builds and a means to assess their automation program.

If you’d like to explore the SOC Automation Capability Matrix in more detail, you’ll find it on Notion, hosted by the Tines team.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Samsung Reveals 2026 Micro RGB Series

Can Google Pixel 10 Pro Fold Replace Your Laptop? I Switched To Find Out

The Ultra-Realistic AI Face Swapping Platform Driving Romance Scams

Bank of Ireland warns customers to be wary of “smishing” scams this Christmas

HPE OneView Flaw Rated CVSS 10.0 Allows Unauthenticated Remote Code Execution

TAGGED: Cyber Security, Cybersecurity, email security, Incident response, Internet, MITRE ATT&CK Framework, phishing attack, Security Automation, security operation, SOC Automation, threat detection, Tines
Share This Article
Facebook Twitter Copy Link
Previous Article Lenovo Tab Plus 11.5 Inch Android Tablet Launched
Next Article RFK Jr. Campaign Fundraising Slumps in May: Filings
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Lifting of US sanctions on Syria could spur refugee returns, UNHCR official says
World News
Samsung Reveals 2026 Micro RGB Series
Tech News
MSCI index exclusion puts crypto treasury companies at risk of forced selling
Crypto
Democrats Demand Vote on ACA Credits Before House Recesses for Holidays
Politics
Greg Biffle’s Wife: All About Cristina Grossu & Their Marriage
Celebrity
Swansea City vs Wrexham Bet Builder Tips – 4/1 Championship Special, Analysis & Predictions
Sports
CEO of nuclear fusion firm Trump Media is merging with: High-velocity capital is critical to build quickly and efficiently. The concerns are secondary
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Lifting of US sanctions on Syria could spur refugee returns, UNHCR official says

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Lifting of US sanctions on Syria could spur refugee returns, UNHCR official says
December 18, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?