Kernel of Truth

Playbook vs Runbook vs Workflow

In cybersecurity, the terms playbook, runbook, and workflow are often used interchangeably—but they have distinct meanings. Here’s a detailed breakdown to help you clearly understand their differences, relationships, and practical use.


🧩 Overview Table

TermPurposeGranularityUsed ByLevel
WorkflowHigh-level process flow (visual/logical)Macro / Process-levelSecurity teams, architectsStrategic
PlaybookPrescriptive guide for handling scenariosScenario-basedSOC, IR, threat huntersTactical
RunbookStep-by-step technical instructionsTask-basedAnalysts, engineersOperational

🔄 What is a Workflow?

Definition:
A workflow is a high-level visual or logical sequence of steps that describes how a process should be carried out—from start to finish. It focuses on who does what, when, and under what conditions.

Characteristics:

  • Often visual (flowcharts, diagrams)
  • Includes decision points
  • Used for planning, training, and automation design

Example:

An alert triggers in Sentinel → Analyst triages alert → Confirms phishing → Escalates to IR → IR isolates host and resets credentials


📘 What is a Playbook?

Definition:
A playbook provides a repeatable response guide to a known threat scenario. It includes logic, decision trees, conditions, and actions—but does not always include the literal steps for execution.

Characteristics:

  • Tactical, scenario-specific
  • Contains threat context and response paths
  • May link to multiple runbooks
  • Often used in SOAR tools

Example:

Phishing Email Playbook:

  • Identify reported email
  • Validate indicators
  • Determine scope
  • Contain impact
  • Notify users
  • Feed IOCs into threat intelligence platform

🔧 What is a Runbook?

Definition:
A runbook contains detailed, often technical instructions that guide analysts or automation tools through performing a specific task.

Characteristics:

  • Very procedural
  • Step-by-step format
  • May include CLI commands, GUI clicks, or API calls
  • Can be manual or automated (via SOAR)

Example:

Reset Compromised User Runbook:

  1. Disable user in Azure AD
  2. Remove active sessions
  3. Reset password
  4. Notify SOC channel
  5. Document in ticket

🔁 How They Work Together

Think of it like a pyramid:

Workflow (Top-Level Overview)
└── Playbook (Scenario-Specific Logic)
└── Runbook(s) (Executable Task Details)

Each workflow may involve multiple playbooks, and each playbook can invoke one or more runbooks to perform exact steps.


⚙️ Related Concepts

TermDescription
Standard Operating Procedure (SOP)General operational process not tied to a threat or system
Automation PlaybooksSOAR workflows that integrate playbooks and runbooks in tools like Sentinel or Splunk
Decision TreesLogic used within playbooks to guide analyst decisions
Escalation MatrixDefines who gets involved and when in a workflow or playbook scenario

🛡 Example in Action: Phishing Response

ElementWhat It Includes
WorkflowFull lifecycle: from detection → triage → response → review
PlaybookSteps to respond to phishing: validate, scope, contain
Runbook1. Analyse headers 2. Sandbox URL 3. Block sender address

🎯 Summary

TermFocusExample
WorkflowEnd-to-end processIncident detection to remediation
PlaybookScenario responseHow to handle a phishing alert
RunbookTask executionHow to reset a compromised password

Example

Here’s a real-world incident response example that shows how a workflow, playbook, and runbook all work together to resolve a malicious PowerShell execution alert — such as one detected by Microsoft Defender for Endpoint or Sentinel.


🎯 Incident Scenario: Suspicious PowerShell Execution on an End-User Laptop


1️⃣ Workflow – High-Level Process Flow

The workflow outlines the entire incident lifecycle from detection to resolution:

📍 Alert Triggered (Defender/Sentinel)

🕵️ Triage by SOC Analyst

📌 Confirm Malicious Behaviour (e.g. obfuscated PowerShell)

🚨 Escalate to Incident Response Team

🔒 Contain Host (via EDR or network isolation)

🛠 Execute Response Playbook

🧼 Eradicate Threat + Perform Root Cause Analysis

🧾 Run Post-Incident Review & Document Lessons

This workflow ensures consistent handling and assigns ownership per step.


2️⃣ Playbook – Tactical Response for “Suspicious PowerShell” Alert

This playbook provides the logic and decision paths to follow based on the scenario.

🔧 PowerShell Execution Detection Playbook

StepDescription
1. Validate AlertConfirm script behaviour (e.g. Invoke-Expression, encoded base64)
2. Check ScopeWas it executed on one host or multiple? Check for lateral movement
3. Investigate File/ScriptPerform static analysis (without execution) and decode any obfuscation
4. Contain EndpointIsolate host using Defender for Endpoint or remove it from the network
5. Identify PayloadDetermine if it downloaded additional files or exfiltrated data
6. Block IOCsUpdate firewall, EDR, or email filters to block malicious domains or hashes
7. Notify TeamsSend alerts to IR team and relevant business owners
8. Escalate or CloseIf confirmed malicious, escalate to IR; otherwise, close and document as benign

3️⃣ Runbooks – Technical Task Scripts

The runbook provides precise, actionable instructions for technical tasks within the playbook.

🛠️ Runbook A: Decode Obfuscated PowerShell Script

# 1. Assign the base64 string
$b64 = "JAB1AHIAbAA9ACcAaAB0AHQAcAA6AC8ALwBtAGE..."

# 2. Decode the script safely
$decoded = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($b64))

# 3. Output the result for manual review
Write-Output $decoded

# 4. Save to log for documentation
$decoded | Out-File -FilePath "C:\IR\decoded_script.txt"

🛠️ Runbook B: Contain Endpoint via Defender for Endpoint

# Use Microsoft Defender API or portal
1. Locate endpoint ID in MDE portal
2. Select “Isolate Device”
3. Choose "Full Network Isolation"
4. Add exceptions for IR team IPs if needed

🛠️ Runbook C: Block Domain Using Firewall (e.g. Palo Alto, NPM)

1. Log in to the firewall console
2. Navigate to “Threat → Block List”
3. Add domain: malicious.evil.com
4. Apply policy and push config

📎 Summary: Mapping All Three Together

LayerTool or FormatExample in This Scenario
WorkflowFlowchart or diagramEnd-to-end incident lifecycle
PlaybookSOAR/Markdown/SharePointPowerShell execution response plan
RunbookCLI scripts, GUI steps, APIDecoding script, isolating host, blocking IOCs