I have worked with many different SOC teams, and the degree to which they use automation varies greatly. In my experience, teams effectively utilizing automation can notably decrease response times to security alerts and incidents while increasing the depth, quality and consistency of alert triage investigation and response. Teams employing automation for alert triage, investigation, incident response and security operations in general have achieved very meaningful efficiencies - cutting down on mundane, rote repetitive work. This allows human analysts to concentrate on more complex and novel aspects of security threat management, demanding nuanced judgment, much deeper analysis and expertise.
Level 1 - Manual: Teams that do things manually without an explicit initiative to automate workflows where possible.
Level 2 - Mostly Manual, Some Automation: Teams that do things manually but have invested in an automation platform to automate the most tedious tasks. The most common use case I have seen here is enrichment using an automation platform.
Level 3- Semi-Manual, Mostly Automated: Teams that use automation to eliminate a large chunk of manual work. Such teams can demonstrate very significant savings in manual efforts per quarter.
Level 4 - Augmentation: The next level focuses on things that cannot be fully automated. Whenever there is human effort involved, the time taken to process that alert, case, or task can easily be in minutes, and the total time taken to respond creeps into hours from minutes. Constantly looking at manual work and focusing on augmentation—where the humans in the loop become more productive and reliable—can yield not just cost savings but considerably improve the quality, consistency, and response times.
Level 5: Autonomous: At this stage, machines or automation excel at performing tasks more effectively than nearly any human. In this world, analysts primarily act as supervisors or escalation points for agents that can outperform human operators in the vast majority of tasks.
There are a few factors that we are trying to balance as we go from Level 1 to Level 5. The most obvious ones are:
Like many things in life - there is not one answer to “How much automation is appropriate in a SOC team” that is the right answer. It's heavily dependent on the customer’s need for consistency/speed in Alert Triage, Investigation & Response, funding levels, and the team’s skill sets play a big part in determining the right answer. That said - the cost of triage, investigation, and response can be brought down while improving the quality and speed - by applying automation, augmentation, and AI to such problems. No matter your starting point, outlining your goals, recognizing how AI enhances efficiency through the analysis of repetitive tasks and predictable automation of response patterns, and conducting a skills assessment are key initial steps for a successful automation journey.