Blue Team Playbook
Aligned to SOC 2, ISO/IEC 27001, and CMMC 2.0
Purpose. A practitioner-ready playbook that gives a security team concrete procedures, control objectives, and audit-ready artifacts that satisfy SOC 2, ISO/IEC 27001, and CMMC simultaneously.
Scope. Modern enterprise environments (on‑prem, cloud/SaaS, endpoints, identity). Adapt the staffing levels/RACI to your organization’s size and risk profile.
Table of Contents
- How to Use This Playbook
- Common Roles & RACI
- 1) Security Monitoring
- 2) Layered Defense (Defense-in-Depth & Zero Trust)
- 3) SIEM Tooling (Log Management, Analytics, Case Management)
- 4) Incident Response Planning
- 5) Disaster Recovery Planning
- Appendix A — Minimal Standards Crosswalk
- Appendix B — Metrics That Drive Improvement
- Appendix C — Evidence Checklist (Audit-Friendly)
- References — Official Sources
How to Use This Playbook
- Implement the controls and procedures chapter by chapter.
- Collect evidence as you operate (tickets, logs, reports) so audits and assessments are straightforward.
- Continuously improve via detection engineering, tabletop exercises, and post‑incident reviews.
- Standards guardrails (authoritative context):
- SOC 2 uses the AICPA Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy).
- ISO/IEC 27001:2022 defines ISMS requirements; ISO/IEC 27002:2022 provides control implementation guidance.
- CMMC is codified by DoD rulemaking (32 CFR 170) and DFARS; Level 2 is assessed against NIST SP 800‑171, with Level 3 adding selected NIST SP 800‑172 safeguards.
Common Roles & RACI
| Role | Key responsibilities |
|---|---|
| CISO / Security Lead | Approves policies; owns risk acceptance & exceptions. |
| SOC Manager | Runs monitoring, detection engineering, 24×7 triage. |
| IR Lead | Owns incident lifecycle, forensics, evidence handling, notifications. |
| IT / Cloud / Platform Leads | Hardening, identity, network, backups; DR exercises. |
| Compliance Lead | Maps evidence to SOC 2 criteria, ISO controls, CMMC objectives. |
| GRC Engineering | Control automation, metrics pipelines, dashboards, POA&M tracking. |
1 - Security Monitoring
Control Objective
Continuously detect anomalous or malicious activity across identity, endpoints, networks, cloud, apps, and data; triage and escalate efficiently; feed improvements back into hardening and IR.
Standards Alignment (Why This Satisfies)
- SOC 2: Ongoing monitoring and system operations underpin the Security & Availability categories.
- ISO/IEC 27001/27002: Logging and monitoring controls and operational guidance are core.
- CMMC: Monitoring supports Audit & Accountability and System & Information Integrity families (L2 baseline), and enables L3 enhancements.
Ground Rules
- Build a formal Information Security Continuous Monitoring (ISCM) program (NIST SP 800‑137/137A): define metrics, log sources, automated collection, and program assessments.
- Consider OMB M‑21‑31 event logging tiers (EL0–EL3) as a maturity guide for coverage/quality.
- Map detections to MITRE ATT&CK (Enterprise) to keep coverage threat‑informed and portable.
Log Source Priority (Minimum → Target)
- Tier 0 (Immediate): IdP/SSO auth logs; EDR/AV; Windows Event Forwarding (auth/process/PowerShell); Linux auditd; VPN/ZTNA; email security; public cloud audit (AWS CloudTrail/Azure Activity Log/GCP Admin Activity); firewall; DNS; key SaaS admin/audit logs.
- Tier 1 (Near‑term): MDM, PAM, web proxy/SWG, CASB, WAF, DB audit, DLP, Kubernetes audit, CI/CD, secret managers, data platform logs.
- Tier 2 (Depth): OT/ICS telemetry, eBPF network sensors, data lake access logs, SaaS UBA.
Tip: For regulated environments, map “critical categories” to EL1/EL2 expectations (centralized access, integrity, and retention) and set SIEM ingestion SLAs accordingly.
Detection Engineering Workflow
- Use‑case intake (risk register, threat intel, red‑team, audit findings).
- Technique mapping to ATT&CK; define required telemetry and false‑positive hypotheses.
- Rule/procedure build (SIEM correlation, EDR analytics, identity analytics).
- Test with atomic behaviors; quality gate on precision, recall, and SNR.
- Deploy with severity/ownership; add auto‑enrichment (asset, user, geo, cloud context).
- Measure & tune: MTTD, alert fidelity, handling time; retire or merge low‑value rules.
Cadence
- Daily: Triage queues; review high‑severity rules; pipeline health; spot‑check false positives.
- Weekly: “Top noisy” rules; backlog grooming; ATT&CK coverage heatmap; % critical assets with Tier 0 logs.
- Monthly: Detections retro with IR; gap‑to‑goal by ATT&CK tactic; micro‑tabletops for top risks.
Artifacts & Evidence: Monitoring policy; ISCM plan; log source inventory with owners/retention; ATT&CK coverage map; tuning notes; KPI dashboards.
2 - Layered Defense (Defense‑in‑Depth & Zero Trust)
Control Objective
Reduce breach likelihood and blast radius through layered preventive, detective, and recovery controls across identity, device, network, application, and data planes.
Standards Alignment
- ISO/IEC 27001/27002: The 2022 control set spans organizational → technological layers (access, network, configuration, supplier, development, backup).
- CMMC: Level 2/3 requirements span AC, CM, SC, SI, IA, MP, etc., forming a layered baseline.
- SOC 2: Trust Services Criteria expect comprehensive, layered controls over security & availability.
Architectural Backbone
- Adopt NIST Zero Trust Architecture (SP 800‑207) (continuous verification, least privilege, strong policy enforcement).
- For DoD/DIB, consult the DoD Zero Trust Reference Architecture for reference patterns.
Layer‑by‑Layer Essentials (Examples)
- Identity: Phishing‑resistant MFA for admins; JIT privileged access; conditional access; continuous risk scoring.
- Endpoint: EDR with prevention; device posture for access; kernel/process telemetry; allow‑listing for sensitive servers.
- Network: Macro/micro‑segmentation; egress filtering; east‑west visibility; encrypted traffic analytics.
- Application & CI/CD: SAST/DAST/SCA; secrets management; signed releases; runtime protection; robust audit trails.
- Data: Classification; least‑privilege access; strong key management; backup/immutability; DLP for exfil channels.
Design References
- Control tailoring: NIST SP 800‑53 Rev.5 (depth and mappings to 800‑171).
- Defensive technique vocabulary: MITRE D3FEND.
- Cross‑sector baselines: CISA Cross‑Sector Cybersecurity Performance Goals (CPGs).
3 - SIEM Tooling (Log Management, Analytics, Case Management)
Control Objective
Collect, normalize, analyze, and retain security‑relevant telemetry at scale to support investigations, compliance evidence, and continuous improvement.
Standards Alignment
- ISO/IEC 27001/27002 & SOC 2: Centralized logging/monitoring, change/audit trails, and operations evidence are recurring expectations.
- CMMC: SIEM/logging underpins Audit & Accountability and System & Information Integrity families (L2).
Authoritative Practices
- NIST SP 800‑92 (Log Management) and Rev. 1 planning guidance for program structure, roles, retention, and improvements.
- NIST ISCM (SP 800‑137) for metrics‑driven monitoring.
- OMB M‑21‑31 for logging tiers, central access, integrity protections, time synchronization.
Reference Architecture (Tool‑Agnostic)
- Ingest: Agents/forwarders (syslog, WEF, cloud native collectors, API polling).
- Normalize & Enrich: Common schema; hostname/user/asset tags; GeoIP; cloud account/resource metadata.
- Detect: Rules, statistical baselines, UEBA, entity risk scoring, ATT&CK‑mapped playbooks.
- Case Management: Auto‑ticketing, SOAR enrichment/containment, evidence vault with chain‑of‑custody.
- Dashboards & KPIs: Coverage, MTTD/MTTR, alert SNR, incident volume by tactic.
- Retention Tiers: Hot (30–90 days), warm (3–6 months), cold archive (≥1 year—tailor to risk/regulatory needs).
Example Detection Starter Set (Map Each to ATT&CK)
- Impossible travel + bypassed MFA
- Privileged role changes outside change windows
- Rare service principal consent to high‑risk OAuth scopes
- New persistence (Run Keys/Startup items, systemd services)
- Lateral movement via SMB/WinRM with admin shares
- Suspicious DNS (DGA/cryptomining patterns)
- Cloud control plane tampering (logging disabled, key rotation halted)
- Mass downloads from sensitive repositories
Evidence: Data source registry, parsing/normalization specs, correlation rule list with test results, SOAR runbooks, case records, retention & integrity controls, KPI exports.
4 - Incident Response Planning
Control Objective
Prepare, detect, analyze, contain, eradicate, and recover from incidents efficiently; capture lessons and improve controls.
Authoritative Baseline
- NIST SP 800‑61 Rev. 3 (Computer Security Incident Handling Guide) aligns with NIST CSF 2.0, emphasizing readiness and continuous learning.
- ISO/IEC 27001/27002: Incident management planning, assessment/decision, response, learning, evidence collection.
- CMMC: Level 2 requires monitoring/response capabilities; Level 3 expects stronger, validated processes.
IR Lifecycle (Implement This)
- Prepare: IR policy; severity matrix; playbooks (ransomware, BEC, data exfil, insider, cloud takeover); comms trees; legal/regulatory notification matrix; evidence handling & chain‑of‑custody.
- Identify/Analyze: Clear triage criteria; standardized artifacts (timeline, indicators, affected assets/users, ATT&CK techniques).
- Contain: Playbooked actions for identity disablement, network isolation, EDR containment, cloud account lockdown; decision guide balancing business impact.
- Eradicate/Recover: Golden image rebuilds, key rotations, control hardening; track POA&Ms; validate with adversary emulation.
- Post‑Incident: Root cause, control failures, cost, dwell time, and lessons learned that update detections and hardening baselines.
Ransomware‑Specific Quick Play
- Maintain offline/immutable backups and tested restore paths.
- Follow the joint #StopRansomware response checklist for investigation, containment, and post‑incident actions.
Evidence: Approved IR policy; annual training; tabletop agendas & minutes; incident tickets/case reports; notification proofs; lessons‑learned & change tracking.
5 - Disaster Recovery Planning
Control Objective
Restore critical services and data to meet business RTO/RPO objectives after cyber events or other disruptions; prove readiness through testing.
Authoritative Baseline
- NIST SP 800‑184: Cybersecurity event recovery (planning, playbooks, testing, metrics).
- ISO 22301:2019: Business Continuity Management System (BCMS); treat DR as a core BCMS capability.
- ISO/IEC 27031: ICT readiness for business continuity.
- ISO/IEC 27001/27002: Controls for security during disruption and ICT readiness for continuity.
DR Program Essentials
- Business Impact Analysis (BIA) to set RTO/RPO and prioritize systems.
- Recovery Strategies: Tiered backups (on‑platform snapshots + cross‑account immutable copies), alternate regions, warm/hot standby for crown jewels, mapped third‑party dependencies.
- Backup Controls: Encryption, integrity checks, offline/immutable copies, periodic restore drills; ensure logging survives the outage (separate log archive path).
- Runbooks per System: Who does what, in what order; recovery validation tests; data reconciliation steps.
- Exercises: Quarterly technical restore tests; annual crisis‑management exercise with executives; measure time‑to‑restore, data loss, and communications effectiveness.
Ransomware Readiness
- Keep a clean‑room environment and documented bare‑metal/cloud rebuild procedures to avoid restoring malware; rely on joint #StopRansomware guidance for response & recovery details.
Evidence: BIA records; approved DR plan; asset‑to‑RTO/RPO mapping; backup & restore logs; exercise reports; improvement actions.
Appendix A — Minimal Standards Crosswalk
Use this as a speaking map with auditors/assessors; this is not a full clause‑by‑clause mapping.
| Chapter | SOC 2 (Trust Services Criteria) | ISO/IEC 27001/27002 (examples) | CMMC (assessment basis) |
|---|---|---|---|
| Security Monitoring | Security & Availability criteria—monitoring, system ops, change mgmt, risk response | Logging/monitoring controls and operational guidance (27002:2022) | NIST SP 800‑171 (L2): Audit & Accountability, System & Information Integrity; L3 adds 800‑172 enhancements |
| Layered Defense | Security criteria across access, change mgmt, system ops | Broad control set across access, network, config, supplier, backup | Cross‑family coverage (AC/CM/IA/SC/SI/MP, etc.) within 800‑171 L2; 800‑172 adds enhancements |
| SIEM Tooling | Evidence for operations, change, monitoring | Logging/monitoring implementation guidance (27002:2022) | 800‑171 L2: Audit & Accountability + integrity monitoring; logging provides core evidence |
| Incident Response | Security & Availability (incident handling) | Incident mgmt planning/response/learning; evidence collection | 800‑171 L2 monitoring/response; maturity expected; L3 oversight by DIBCAC |
| Disaster Recovery | Availability (resilience & recovery) | ISO 22301 BCMS; 27031 ICT readiness; continuity controls in 27001/27002 | Supports L2/L3 resilience and DFARS continuity obligations |
Appendix B — Metrics That Drive Improvement
- Coverage: % of crown‑jewel assets with Tier 0 log sources; % of ATT&CK techniques with ≥1 detection.
- Effectiveness: MTTD/MTTR; alert precision/recall; containment time; reinfection rate.
- Resilience: Mean time to clean rebuild; restore success rate; RTO/RPO attainment; drill pass rate.
- Program health: % control automations with continuous evidence; % findings closed on time; POA&M burndown (CMMC).
Appendix C — Evidence Checklist (Audit‑Friendly)
- Governance: Policies (monitoring, IR, DR), ISMS scope, risk assessments, asset inventories, supplier lists.
- Operations: SIEM data source register; retention & integrity controls; detection catalog mapped to ATT&CK; SOAR playbooks.
- IR: Training rosters; tabletop minutes; incident case files; notification proofs; lessons‑learned and changes.
- DR/BC: DR plan; BIA; backup/restore logs; exercise reports; RTO/RPO dashboards.
- CMMC: Current status in SPRS (if applicable), assessment artifacts/affirmations; POA&Ms tracked to closure per rule timelines.
References — Official Sources
Note: These are the authoritative documents this playbook aligns to. Obtain the latest versions from the publishing bodies.
- AICPA — SOC 2 Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, Privacy).
- ISO/IEC 27001:2022 — Information security, cybersecurity and privacy protection — Information security management systems — Requirements.
- ISO/IEC 27002:2022 — Information security, cybersecurity and privacy protection — Information security controls (implementation guidance).
- DoD CMMC — Program rule (32 CFR part 170) and DFARS rule; Level 2 based on NIST SP 800‑171; Level 3 adds selected NIST SP 800‑172 safeguards.
- NIST SP 800‑61 Rev. 3 — Computer Security Incident Handling Guide.
- NIST SP 800‑184 — Guide for Cybersecurity Event Recovery.
- NIST SP 800‑137 / 800‑137A — Information Security Continuous Monitoring (ISCM) & ISCM Program Assessment.
- NIST SP 800‑92 (and Rev. 1 Planning Guidance) — Guide to Computer Security Log Management.
- NIST SP 800‑207 — Zero Trust Architecture.
- NIST SP 800‑53 Rev. 5 — Security and Privacy Controls for Information Systems and Organizations.
- MITRE ATT&CK® — Adversary tactics, techniques, and procedures knowledge base.
- MITRE D3FEND™ — Defensive countermeasures knowledge graph.
- CISA Cross‑Sector Cybersecurity Performance Goals (CPGs) — Baseline outcome‑based goals for critical infrastructure.
- OMB M‑21‑31 — Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity Incidents.
- ISO 22301:2019 — Security and resilience — Business continuity management systems — Requirements.
- ISO/IEC 27031 — Guidelines for ICT readiness for business continuity.
