AI in Cyber Defence — Automated Response, SOAR, and Deception Technology
What Is AI in Cyber Defence and Why Does It Matter?
Section titled “What Is AI in Cyber Defence and Why Does It Matter?”AI cyber defence uses artificial intelligence and automation to respond to threats faster than any human team could manage alone. While AI threat detection focuses on identifying threats, AI defence focuses on what happens next — automated triage, containment, remediation, and proactive deception to slow attackers down.
The cybersecurity skills gap is real. There are not enough trained analysts to handle the volume and speed of modern attacks. SOAR platforms (Security Orchestration, Automation, and Response), AI-driven vulnerability management, and deception technology help security teams do more with fewer people — not by replacing humans, but by automating the repetitive, time-sensitive tasks that consume most of a SOC analyst’s day.
When I started learning about incident response, I was struck by how much of a SOC analyst’s day is spent on repetitive tasks — checking the same types of alerts, running the same enrichment queries, creating the same tickets. Then I learned about SOAR playbooks and it made so much sense. It is like creating a recipe that the system follows automatically for common scenarios, so analysts can focus on the incidents that actually need human thinking. That shift from “do everything manually” to “automate the predictable, investigate the unusual” changed how I think about security careers.
Certification context: CompTIA Security+ SY0-701 covers automation concepts, incident response procedures, and security orchestration. CEH v13 addresses AI-powered defensive tools and automated response capabilities.
What Do Real-World AI Defence Challenges Look Like?
Section titled “What Do Real-World AI Defence Challenges Look Like?”The NIST AI RMF identifies automated response as a key capability for managing AI risk at scale, while OWASP AI Security guidelines outline defensive measures against adversarial attacks on AI systems. Security teams face challenges that cannot be solved by adding more people alone. AI-powered defence addresses these specific operational gaps.
| Problem | What goes wrong without AI defence | How AI defence helps |
|---|---|---|
| Response speed | Average time to contain a breach is 80+ days — attackers have weeks to cause damage | Automated playbooks contain threats in seconds to minutes, not hours or days |
| Alert overload | SOC analysts manually triage thousands of alerts, leading to burnout and missed threats | SOAR platforms auto-triage, enrich, and prioritise alerts before a human sees them |
| Vulnerability backlog | Organisations have thousands of unpatched vulnerabilities but cannot patch everything at once | AI-driven prioritisation ranks vulnerabilities by exploitability, asset criticality, and threat context |
| Attacker reconnaissance | Attackers scan networks freely without consequence, mapping infrastructure before attacking | Deception technology (honeypots, honeytokens) detects and misdirects attackers during reconnaissance |
| Phishing at scale | Sophisticated phishing emails bypass traditional filters, and volume makes manual review impossible | NLP-based email analysis detects phishing based on language patterns, sender behaviour, and intent |
| Inconsistent response | Different analysts handle the same type of incident differently, leading to quality gaps | Standardised SOAR playbooks ensure consistent, best-practice response regardless of who is on shift |
How Does AI Cyber Defence Work?
Section titled “How Does AI Cyber Defence Work?”MITRE ATLAS documents adversarial techniques targeting AI systems and the corresponding defensive measures, while NIST SP 800-61 provides the incident handling framework that SOAR platforms automate. Think of AI defence like the autopilot system on a commercial aircraft. The pilots (security analysts) are still in command and make all the critical decisions. But the autopilot handles routine adjustments — maintaining altitude, correcting for wind, following the flight plan — so the pilots can focus on navigation decisions, unusual weather, and emergencies. If something truly unexpected happens, the pilots take manual control.
Similarly, AI defence automates the routine (triage, enrichment, containment of known threat types) so analysts can focus on complex investigations, threat hunting, and strategic decisions.
Key Defence Technologies
Section titled “Key Defence Technologies”| Technology | What it does | Key tools |
|---|---|---|
| SOAR | Orchestrates and automates incident response workflows using playbooks | Palo Alto XSOAR, Splunk SOAR, Microsoft Sentinel, Swimlane |
| AI-driven vulnerability management | Prioritises patching based on exploitability, asset value, and threat intelligence | Tenable.io, Qualys VMDR, Rapid7 InsightVM |
| Deception technology | Deploys fake assets (honeypots, honeytokens) to detect and misdirect attackers | Attivo Networks, Illusive Networks, TrapX |
| AI email security | Analyses email content, sender behaviour, and metadata to detect phishing and BEC | Abnormal Security, Proofpoint, Microsoft Defender for Office 365 |
| Automated threat hunting | Uses ML to proactively search for indicators of compromise across telemetry | CrowdStrike Falcon OverWatch, Microsoft Defender, SentinelOne |
SOAR: The Automation Engine
Section titled “SOAR: The Automation Engine”SOAR platforms are the backbone of AI-powered defence. They connect security tools together and execute automated workflows called playbooks.
A playbook defines: “When X happens, do Y, then Z.” For example:
- Trigger: A phishing email is reported by an employee
- Enrich: Automatically check the sender’s reputation, scan URLs, analyse attachments in a sandbox
- Decide: If malicious indicators are found, proceed to containment
- Contain: Quarantine the email from all mailboxes, block the sender domain, isolate any endpoints that clicked the link
- Notify: Create a ticket, notify the security team, send a response to the reporter
- Document: Log all actions taken for compliance and post-incident review
This entire workflow can execute in under 60 seconds — compared to 30-60 minutes for manual handling.
Step-by-Step: How AI-Enhanced Incident Response Works
Section titled “Step-by-Step: How AI-Enhanced Incident Response Works”Understanding the end-to-end workflow shows where automation adds value and where human judgement remains essential.
Step 1 — Detection and Alert Generation
Section titled “Step 1 — Detection and Alert Generation”AI-powered detection systems (UEBA, ML-based SIEM) generate prioritised alerts with risk scores. Instead of raw alerts, the SOAR platform receives enriched, correlated incidents.
Step 2 — Automated Triage and Enrichment
Section titled “Step 2 — Automated Triage and Enrichment”The SOAR playbook automatically enriches the alert: queries threat intelligence feeds, checks reputation databases, looks up the affected user’s role and access level, pulls recent activity logs, and checks if the indicator has been seen in other alerts.
Step 3 — Classification and Routing
Section titled “Step 3 — Classification and Routing”Based on enrichment results, the system classifies the incident (phishing, malware, unauthorised access, data exfiltration) and routes it to the appropriate team or playbook. Low-confidence incidents go to Tier 1 analysts. High-confidence, high-severity incidents trigger automated containment and escalate to senior analysts.
Step 4 — Automated Containment (Where Appropriate)
Section titled “Step 4 — Automated Containment (Where Appropriate)”For well-understood threat types, automated containment runs immediately: isolating an endpoint, disabling a compromised account, blocking a malicious IP at the firewall, or quarantining a phishing email across all mailboxes. The key word is “well-understood” — automation handles the predictable; humans handle the ambiguous.
Step 5 — Human Investigation
Section titled “Step 5 — Human Investigation”Analysts investigate the incident with the enrichment data already prepared. They confirm the classification, assess the full scope, identify root cause, and determine if additional response is needed. The AI system has saved them 30-60 minutes of manual data gathering.
Step 6 — Remediation and Recovery
Section titled “Step 6 — Remediation and Recovery”Remediation may be partially automated (reimage an endpoint, reset credentials, apply patches) or manual (architecture changes, policy updates). The SOAR platform tracks all remediation actions and deadlines.
Step 7 — Post-Incident Learning
Section titled “Step 7 — Post-Incident Learning”Incident details and analyst feedback are captured. If the automated response was incorrect, the playbook is refined. This continuous improvement cycle is what makes AI defence increasingly effective over time.
How Does AI Defence Fit Into a Security Architecture?
Section titled “How Does AI Defence Fit Into a Security Architecture?”AI-Enhanced Incident Response Workflow
Section titled “AI-Enhanced Incident Response Workflow”📊 Visual Explanation
Section titled “📊 Visual Explanation”AI-Enhanced Incident Response Workflow
Automation handles speed and volume — humans provide judgement and context
Manual SOC vs AI-Augmented SOC
Section titled “Manual SOC vs AI-Augmented SOC”Manual SOC vs AI-Augmented SOC
- Alert triage: 15-30 min each — Analyst manually enriches and investigates every alert
- Response time: hours to days — Containment waits for human availability and approval
- Inconsistent handling — Quality depends on which analyst and their experience level
- Alert fatigue and burnout — Thousands of alerts per day lead to missed threats
- Reactive posture only — No time for proactive threat hunting when overwhelmed by alerts
- Alert triage: <60 seconds — SOAR auto-enriches and prioritises before analyst sees it
- Response time: seconds to minutes — Automated containment for known threat patterns
- Consistent playbook execution — Same response quality regardless of shift or analyst
- Manageable alert queue — ML correlation reduces alerts by up to 90%
- Time for threat hunting — Analysts freed from routine tasks can hunt proactively
What Does AI Defence Look Like in Practice?
Section titled “What Does AI Defence Look Like in Practice?”NIST SP 800-61 Rev. 2 defines the incident handling lifecycle that SOAR platforms automate, covering preparation, detection, containment, eradication, recovery, and post-incident activity.
Example 1: SOAR Playbook for Phishing Response
Section titled “Example 1: SOAR Playbook for Phishing Response”# Simplified SOAR playbook — phishing email reportedplaybook: phishing_response_v3trigger: user_reported_phishing OR email_gateway_quarantine
steps: - name: extract_indicators action: parse_email extract: [sender_address, urls, attachment_hashes, reply_to]
- name: enrich_indicators parallel: true actions: - check_url_reputation: [VirusTotal, URLhaus] - check_sender_reputation: [Spamhaus, internal_blocklist] - sandbox_attachments: [Any.Run, CrowdStrike Falcon Sandbox]
- name: evaluate_risk condition: IF any_indicator.malicious == true risk_score: calculate_from_enrichment
- name: contain condition: IF risk_score > 70 actions: - quarantine_email_all_mailboxes - block_sender_domain: firewall + email_gateway - isolate_endpoints: [clicked_url OR opened_attachment] - disable_user_accounts: [if credentials_entered]
- name: notify actions: - create_incident_ticket: ServiceNow - notify_soc_channel: Slack #soc-alerts - send_user_response: "Thank you for reporting. We have investigated."
- name: document actions: - log_all_actions: SIEM - update_threat_intel: internal_IOC_databaseExample 2: AI-Driven Vulnerability Prioritisation
Section titled “Example 2: AI-Driven Vulnerability Prioritisation”Vulnerability Management Dashboard — AI-Prioritised
Total unpatched vulnerabilities: 12,847
AI-prioritised critical (patch within 48 hours): 1. CVE-2025-XXXX — Remote code execution in web server CVSS: 9.8 | Exploited in wild: YES | Asset: customer-facing portal AI priority: CRITICAL (exploitability + asset exposure + active exploitation)
2. CVE-2025-YYYY — Privilege escalation in AD CVSS: 8.1 | Exploited in wild: NO | Asset: domain controller AI priority: CRITICAL (high impact + crown jewel asset + lateral movement path)
AI-deprioritised (patch in normal cycle): - CVE-2025-ZZZZ — CVSS 7.5 but requires physical access, no exploit code exists, asset is air-gapped test environment AI priority: LOW (despite high CVSS)
Without AI: all three would be "High/Critical" based on CVSS alone.With AI: resources focus on the two that actually pose real risk.Example 3: Deception Technology in Practice
Section titled “Example 3: Deception Technology in Practice”Honeypot Alert: CRITICAL — Attacker interacting with decoy
Decoy type: Fake database server (appears to contain customer records)Decoy location: Internal network segment — production VLANAlert trigger: SQL query attempt against honeypot database
Attacker activity log: 14:23:05 — Port scan detected honeypot on 10.0.3.200:3306 14:23:18 — MySQL connection attempt (credential: admin/admin) 14:23:21 — Login successful (honeypot accepts all credentials) 14:23:34 — "SHOW DATABASES;" executed 14:23:41 — "SELECT * FROM customers LIMIT 10;" executed 14:24:02 — Bulk data query attempted
Value: No legitimate user would ever connect to this decoy.Any interaction = confirmed malicious activity + attacker TTP intelligence.Source IP: 10.0.2.105 (compromised workstation — lateral movement confirmed)What Are the Limitations of AI Defence?
Section titled “What Are the Limitations of AI Defence?”MITRE ATLAS catalogues adversarial techniques specifically designed to evade or manipulate AI-powered defensive systems, demonstrating that AI defence introduces its own attack surface. AI defence is not a silver bullet. Understanding the limitations prevents over-reliance and helps you implement these tools effectively.
| Strength | Limitation / failure mode | Mitigation |
|---|---|---|
| Automated containment is fast | Over-containment risk — auto-isolating a critical server causes business outage | Define containment policies by asset criticality, require approval for tier-1 assets |
| SOAR playbooks ensure consistency | Playbook rigidity — novel attacks that do not match any playbook fall through | Combine playbooks with human-driven threat hunting for unknown scenarios |
| AI-driven patching prioritises well | Patching still requires testing — auto-deploying patches can break production systems | AI prioritises; humans approve and test before deployment to critical systems |
| Deception detects lateral movement | Maintenance overhead — honeypots need to look realistic to be effective | Update decoys regularly, ensure they match the real environment |
| Phishing detection via NLP improves | Adversarial crafting — attackers test emails against AI filters before sending | Layer AI email analysis with user awareness training and reporting mechanisms |
| Reduces analyst burnout | Automation complacency — analysts may stop questioning automated decisions | Regular playbook reviews, red team exercises, and “trust but verify” culture |
What Interview Questions Should You Expect About AI Defence?
Section titled “What Interview Questions Should You Expect About AI Defence?”Interviewers test whether you understand how AI defence tools work in practice and where humans remain essential.
| Question | What they are testing | Strong answer approach |
|---|---|---|
| What is SOAR and how does it help a SOC? | Understanding of automation in security operations | SOAR connects security tools and automates response through playbooks — reducing MTTR, ensuring consistency, and freeing analysts for complex investigations |
| What is the difference between SIEM and SOAR? | Ability to distinguish detection from response | SIEM collects and correlates logs for detection and alerting. SOAR takes those alerts and automates the response workflow — enrichment, containment, ticketing |
| Can you give an example of a SOAR playbook? | Practical understanding | Walk through a phishing playbook: trigger on reported email, auto-enrich indicators, sandbox attachments, contain if malicious, notify team, document |
| What is deception technology? | Awareness of proactive defence | Deception deploys fake assets (honeypots, honeytokens) that no legitimate user would interact with. Any interaction is a confirmed indicator of malicious activity |
| Will AI replace SOC analysts? | Critical thinking about the role of automation | No. AI automates repetitive tasks and handles volume, but complex investigations, threat hunting, and strategic decisions require human judgement. The role evolves from “alert processor” to “investigation specialist” |
How Is AI Defence Used in Real Security Operations?
Section titled “How Is AI Defence Used in Real Security Operations?”AI-powered defence is reshaping how Australian organisations operate their security functions.
Australian Government adoption: The Australian Signals Directorate’s ACSC has emphasised automation in incident response guidance. Federal government agencies are adopting SOAR platforms to meet the Essential Eight maturity requirements, particularly around patching, application control, and incident response timeframes.
Financial sector: Australia’s Big Four banks (CBA, ANZ, Westpac, NAB) are among the most advanced adopters of AI-powered defence, deploying SOAR platforms, AI-driven vulnerability management, and deception technology. The Australian Prudential Regulation Authority (APRA) CPS 234 standard requires regulated entities to maintain “information security capability commensurate with information security vulnerabilities and threats” — AI-powered tools help meet this at scale.
Managed security services: Many mid-sized Australian organisations outsource to managed security service providers (MSSPs) that use AI-powered SOAR and detection platforms. Understanding SOAR concepts is valuable even if you work for an organisation that uses managed services, because you need to understand what your MSSP is doing on your behalf.
Career implications: Australian SOC analyst job listings increasingly mention SOAR experience as a preferred qualification. Familiarity with platforms like Palo Alto XSOAR, Splunk SOAR, or Microsoft Sentinel automation is a differentiator for entry-level candidates. The key message: learn one SOAR platform well enough to understand the concepts, and the skills transfer to others.
Summary and Key Takeaways
Section titled “Summary and Key Takeaways”AI-powered cyber defence automates the speed-critical, repetitive aspects of security operations while elevating the role of human analysts.
- SOAR platforms are the automation backbone — they connect security tools and execute playbooks that reduce mean time to respond from hours to minutes.
- Automated containment (isolating endpoints, blocking IPs, quarantining emails) handles well-understood threats at machine speed, but requires careful policies for critical assets.
- AI-driven vulnerability management prioritises patching by combining CVSS scores with exploitability data, asset criticality, and threat intelligence — not just raw severity.
- Deception technology (honeypots, honeytokens) provides high-confidence alerts because no legitimate user should interact with decoy assets.
- AI email security uses NLP and behavioural analysis to detect phishing and business email compromise that bypasses traditional filters.
- The analyst role evolves, not disappears. AI handles volume and speed; humans provide judgement, investigation, and strategic decision-making.
- Automation complacency is a real risk. Regular playbook reviews, red team exercises, and a “trust but verify” culture are essential.
Related
Section titled “Related”- AI-Powered Threat Detection for how AI identifies the threats that defence systems respond to
- AI Ethics and Legal Frameworks for the ethical considerations of automated security decisions
- Incident Response for the broader IR process that SOAR automates
- Future of Cybersecurity for where AI defence is heading next
Frequently Asked Questions
What is SOAR in cybersecurity?
SOAR stands for Security Orchestration, Automation, and Response. It is a category of platforms that connect security tools together and automate incident response workflows through playbooks. Popular SOAR platforms include Palo Alto XSOAR, Splunk SOAR, and Microsoft Sentinel.
How does SOAR differ from SIEM?
SIEM (Security Information and Event Management) collects, correlates, and analyses log data to detect threats and generate alerts. SOAR takes those alerts and automates the response — enriching indicators, executing containment actions, creating tickets, and coordinating across tools. SIEM detects; SOAR responds.
What is a SOAR playbook?
A playbook is an automated workflow that defines the steps to take when a specific type of security event occurs. For example, a phishing playbook might automatically extract indicators from a reported email, check them against threat intelligence feeds, sandbox attachments, quarantine the email from all mailboxes, and create an incident ticket — all within 60 seconds.
What is deception technology in cybersecurity?
Deception technology deploys fake assets — honeypots (decoy servers), honeytokens (fake credentials or files), and other decoys — across a network. Since no legitimate user or system should interact with these fakes, any interaction is a high-confidence indicator of malicious activity, such as an attacker performing lateral movement.
Will AI and automation replace SOC analysts?
No. AI and SOAR automate repetitive, time-sensitive tasks like alert triage, enrichment, and containment of known threat types. This frees analysts to focus on complex investigations, threat hunting, and strategic security decisions that require human judgement. The role evolves from alert processor to investigation specialist.
What is AI-driven vulnerability management?
AI-driven vulnerability management uses machine learning to prioritise patching by combining multiple factors: CVSS severity scores, active exploitation data, asset criticality, network exposure, and threat intelligence context. This means a vulnerability with a high CVSS score on an air-gapped test system gets deprioritised versus a lower CVSS vulnerability actively exploited on a customer-facing server.
How fast can automated incident response contain a threat?
Automated SOAR playbooks can execute containment actions (isolating endpoints, blocking IPs, quarantining emails) in seconds to minutes, compared to hours or days for manual response. Organisations adopting SOAR report 80-90% reduction in mean time to respond for playbook-covered scenarios.
What are the risks of automated containment?
The main risk is over-containment — automatically isolating a critical production server could cause a business outage worse than the security incident itself. Mitigation includes defining containment policies by asset criticality, requiring human approval for tier-1 assets, and thoroughly testing playbooks before deployment.
Do I need programming skills to use SOAR?
Basic SOAR playbook creation uses visual drag-and-drop workflow builders that do not require coding. However, more advanced playbook customisation, integration development, and custom automation scripts benefit from Python or similar scripting skills. For entry-level roles, understanding SOAR concepts is more important than coding ability.
Is SOAR experience needed for entry-level security jobs?
SOAR experience is increasingly listed as a preferred (not required) qualification for SOC analyst roles. Familiarity with SOAR concepts and having used at least one platform — even in a lab environment — differentiates you from other candidates. Many platforms offer free community editions or trial access for learning.
More resources
Official documentation for one of the leading SOAR platforms — includes playbook examples and integration guides.
NIST Computer Security Incident Handling GuideNIST SP 800-61 — the foundational guide for incident response processes that SOAR platforms automate.
ACSC Incident Response PlanningAustralian Signals Directorate's guidance on incident response planning for Australian organisations.
Technical concepts verified in March 2026 against vendor documentation for Palo Alto XSOAR, Splunk SOAR, and Microsoft Sentinel automation, NIST SP 800-61 incident handling guidelines, and ASD ACSC guidance. Platform capabilities and features should be verified against current vendor documentation as this field evolves rapidly. Salary and career outcome data sourced from CyberSeek and BLS Occupational Outlook Handbook as of 2025. Individual results vary based on location, experience, market conditions, and effort.