Skip to main content

 

Splunk Lantern

Security orchestration, automation, and response data

 

Security orchestration, automation, and response (SOAR) data refers to the information generated, processed, and managed by SOAR platforms that coordinate, automate, and streamline security operations workflows. This data includes alerts, incident records, playbook executions, task assignments, enrichment results, evidence collection, and audit trails—enabling faster, more consistent, and documented responses to security threats and events.

The key characteristics of SOAR data include being:

  • Workflow-centric: Captures the sequence of automated and manual steps in security incident handling
  • Integrative: Aggregates data from multiple security tools (SIEM, EDR, threat intel, ticketing, etc.
  • Actionable: Documents decisions, actions, and outcomes for each security event
  • Auditable: Provides logs, evidence, and reports for compliance and review

Examples of SOAR data include:

  • Alert ingestion records: SIEM alert details captured by SOAR platform
  • Incident case data: Incident ticket with status, assignments, and history
  • Playbook execution logs: Steps, actions, and outcomes of automated/manual workflows
  • Automated response actions: Actions like IP blocking, account disabling, device isolation
  • Threat intelligence enrichment results: Results from domain/IP/file reputation checks
  • Task assignments and audit trails: Manual tasks and analyst actions with timestamps and notes
  • Evidence and artifact collection: Collected logs, artifacts, and related metadata
  • Case closure and reporting: Summary of incident resolution and post-action documentation

Before looking at documentation for specific data sources, review the Splunk Docs information on general data ingestion: