Lab 06 Intermediate

Build and Test an Investigation Playbook

90-120 minutes Modules: Module 1, Module 7, Module 8

Objective

Take PB-SOC-001 (AiTM credential phishing playbook) from Module 7 and adapt it from a generic template to a production playbook customised for your organisation. Then validate it through a tabletop exercise.

Required: Completed Modules 1, 7, and 8. No Sentinel workspace needed — this is a process lab.


Part 1: Customise the playbook (45 minutes)

Open PB-SOC-001 from Module 7, subsection 7.4.

1.1 Escalation contacts

Replace every generic reference with named contacts:

RoleGenericYour environment
SOC Manager“SOC Manager”[Name, phone, Teams handle]
CISO“Security leadership”[Name, phone, email]
IT Operations“IT operations”[Name/team, Teams channel]
Legal / Compliance“Legal counsel”[Name, phone, email]
HR“HR”[Name, phone]
MDR provider (if applicable)“Managed SOC”[Escalation process, portal URL]

1.2 Containment approval matrix

Map generic approval levels to your authority structure:

ActionGeneric authorityYour authorityAfter-hours authority
Token revocationT2 or SOC Manager
Account disablementSOC Manager
Device isolationSOC Manager
IP block (firewall)SOC Manager + IT Ops
Email purge (org-wide)SOC Manager

If you operate with an MDR provider for after-hours coverage, define the handoff: what can the MDR execute autonomously, what requires your approval?

1.3 SLA timelines

Review each SLA against your team capacity:

PhasePlaybook SLAAchievable?Your SLA
Triage start15 minutes
Triage decision30 minutes
Containment start60 minutes
Full scope assessment4 hours
Executive summary24 hours

1.4 Communication templates

Adapt the user notification template with your specifics:


Part 2: Tabletop exercise (45-60 minutes)

Scenario

14:30 UTC: DET-SOC-008 fires for m.chen@[yourdomain]. An inbox forwarding rule was created sending to ext-data@protonmail.com. The preceding sign-in originated from IP 185.234.xx.xx (ASN 14061, DigitalOcean, Ukraine).

Work through PB-SOC-001 step by step. At each decision point, document your action and reasoning.

Additional information revealed as you progress:

Tabletop questions:

  1. What is your triage classification and severity?
  2. What containment actions do you execute, in what order, and who approves each?
  3. The second user (j.morrison) changes the scope. How does this affect your response?
  4. When and who do you notify?
  5. What evidence do you preserve for the incident record?
  6. Does this incident require regulatory notification under GDPR Article 33? Why or why not?

Debrief


Verification checklist