SOC Handoff Note
Purpose
Package a hunt or detection for SOC triage and escalation.
Fields
- handoff_id: Unique handoff identifier.
- alert_or_hunt: Name of alert or hunt.
- why_it_matters: Threat and impact context.
- first_checks: Initial triage steps.
- required_logs: Logs needed for triage.
- false_positives: Expected benign causes.
- escalation: Escalation threshold.
- response: Authorized response guidance.
- feedback: What SOC should report back.
Example Values
handoff_id: SOC-004
alert_or_hunt: Non-IT RMM Installation
why_it_matters: Reported adversary behavior uses RMM after phishing.
first_checks: User, host role, install source, ticket, remote session.
required_logs: EDR, software inventory, email, identity.
false_positives: Helpdesk support, approved vendor work.
escalation: No ticket plus external session plus suspicious email.
response: Isolate only per IR policy.
feedback: True/false positive and tuning notes.
Quality Gates
- First checks are concrete.
- Escalation threshold is clear.
- False positives are realistic.
- Response stays within authority.
Common Failure Modes
- No triage path.
- Overbroad escalation.
- No feedback loop.
Practical Workflow
- Create the artifact only after the intelligence requirement or decision is clear.
- Fill required fields before writing narrative prose.
- Attach evidence labels, source references, confidence, and limitations.
- Review with the intended consumer.
- Update the artifact when evidence, telemetry, or decision context changes.
Analyst Checklist
- Is the consumer defined?
- Are required fields complete?
- Are claims source-backed or marked Gap?
- Is confidence justified?
- Are limitations explicit?
- Is there a next action or owner?
Cross-Links
References
Required vs Optional Fields
Required: alert/hunt name, why it matters, first checks, required logs, false positives, escalation threshold, response authority, feedback loop, owner.
Optional: screenshots, sample queries, known-good admin lists, rollback contact.
Pass / Fail Example
Pass: SOC can triage without reading the original CTI report.
Fail: Handoff says "investigate suspicious activity" with no first checks or escalation threshold.
Complete Filled Example
handoff_id: SOC-RMM-001
alert_or_hunt: Non-IT RMM Install Followed by External Session
why_it_matters: Unauthorized RMM can provide persistent remote control.
first_checks: host owner, install source, parent process, ticket, user, remote destination.
required_logs: EDR, software inventory, identity, network, ticketing.
false_positives: Helpdesk, vendor support, IT migration.
escalation: No ticket plus external session plus suspicious pre-install activity.
response: Follow IR policy; isolate only under incident commander authority.
feedback: True positive, false positive class, missing fields, tuning request.
owner: SOC Lead