IACD Playbooks

 

iacd playbook gallery

Here is a selection of sample playbooks provided by the IACD team.

 

What is a playbook?

  Introduction to IACD Playbooks

Introduction to IACD Playbooks

IACD provides a mechanism where business- and operations-driven objectives, processes, and controls—including those captured via a Cybersecurity Framework profile—can be translated and applied as automated response actions. Via IACD playbooks, conditions, indicators, and controls that drive the need for cybersecurity responses are captured for orchestration services to monitor and execute.

  How to build an IACD Playbok

How to build an IACD Playbok

Playbooks bridge the gap between an organization’s policies and procedures and a security automation and orchestration (SA&O) vendor’s capabilities by showing how an SA&O vendor is able to satisfy a client’s policy and procedure requirements through repeatable and auditable processes, with points where security automation can be implemented.

  Types of Content in an IACD Playbook

Types of Content in an IACD Playbook

As you create playbooks for your environment, finding the right content to include and use cases is critical. We provide several references and guides for identifying the best way to achieve these goals as you adopt the IACD framework.

 

It is important to note that whenever there are options for analysts/operators to select, approve, or authorize, they may choose a “none of the above” option, which simply moves them to the next step in the playbook. For example, in the Compromised Credentials playbook, an organization may not want to take any initial actions to mitigate until they perform more in-depth analysis. Also, a workflow that is implemented at an organization may skip steps depending on conditional logic (e.g., Was the employee fired? If yes, do not do an extra investigation and go straight to restriction of privileges).

 
 

Playbook THIN SPECIFICATION

To help the creation of IACD playbooks, a specification documents for playbooks is provided here. The purpose of this document is to provide the minimum requirements necessary for current and future Integrated Adaptive Cyber Defense (IACD) participants to create security automation playbooks that are supportive of the IACD framework. This thin specification does not overly prescribe or dictate difficult-to-achieve requirements, but presents the minimum conditions of a well-conceived IACD playbook.