Skip to main content

Home  /  Case Studies  /  How SOAR & IR Solutions Revolutionized Our Client's Incident

● Case Study ★ SaaS

How SOAR & IR Solutions Revolutionized Our Client's Incident Response

SOAR-led incident response automation for an Indian SaaS enterprise. Real engagement by an ISO/IEC 27001:2022 certified team with measurable outcomes.

Case Study Industry-Standard Methodology Real Client Outcome
14 hrs
BASELINE MTTR
73%
MTTR REDUCTION
12
PLAYBOOKS BUILT
< 90 min
NEW MEDIAN MTTR

At a Glance

  • Industry: B2B SaaS
  • Engagement type: SOAR Implementation + Incident Response Playbook Build-Out
  • Tech stack: Microsoft Sentinel SIEM, Logic Apps SOAR, Microsoft Defender XDR, Entra ID, ServiceNow ITSM, custom Python orchestration
  • Outcome: All critical and high-severity findings remediated and re-tested with no critical issues remaining at close.
  • Delivered by: ISO/IEC 27001:2022 certified consultants with OSCP, OSEP, CISA, CISM credentials.

Compliance Frameworks Satisfied

ISO 27001 A.5.24-A.5.27 SOC 2 Type 2 NIST CSF Respond MITRE D3FEND CERT-In Direction 2022 DPDP Act

Client Overview

Industry: B2B SaaS

Product: Microsoft 365 + AWS-based SaaS platform serving 1,200 customer organizations

Tech stack: Microsoft Sentinel SIEM, Logic Apps SOAR, Microsoft Defender XDR, Entra ID, ServiceNow ITSM, custom Python orchestration

The client is a mid-sized Indian SaaS company with approximately 400 employees, 1,200 customer organizations and three product lines. Primary office in Bengaluru with hybrid workforce post-COVID, primarily Microsoft 365 and AWS infrastructure.

Challenge

Three factors drove the urgency of this engagement:

  • Alert volume saturation. 200+ alerts per analyst per shift with a 60% false positive rate, creating constant alert fatigue and missed incidents
  • Slow incident response. Mean time to respond averaged 14 hours, with critical incidents sometimes lingering 3-5 days due to manual triage workflows
  • Analyst time waste. Tier 1 analysts spent 80% of their time on repetitive enrichment tasks instead of actual incident response

Our Approach

Codesecure delivered a structured engagement combining automated coverage with deep manual testing focused on the specific risk areas for this client.

1
Day 1-2
Scoping & NDA
2
Day 3-4
Threat Model
3
Day 5-12
Active Testing
4
Day 13-14
Reporting
5
+30 Days
Free Retest

Scope of Testing

The engagement covered the following primary areas:

  • Deployed Microsoft Sentinel's built-in SOAR capabilities (Logic Apps + Automation Rules)
  • Built 12 high-volume incident playbooks covering phishing, credential abuse, malware detection, suspicious login enrichment
  • Integrated 15+ data sources for automated enrichment (threat intel, asset criticality, user history, similar past incidents)
  • Implemented tiered governance: automated for enrichment, human-approved for blast-radius actions
  • Trained Tier 1 analysts on SOAR-augmented workflows with clear escalation paths
  • Established metrics dashboard: MTTR per incident type, alert volume, false positive rate, automation success
  • Quarterly tabletop exercises validating SOAR-augmented response across scenarios

// Tooling Used

Microsoft Sentinel Logic Apps Microsoft Defender XDR ServiceNow VirusTotal Recorded Future Slack Custom Python

Reporting & Walkthrough

Executive summary delivered alongside a technical report containing reproducible PoC steps, CVSS v3.1 severity scoring and developer-actionable remediation guidance. Live walkthrough with the client team covered every critical finding with reproduction and recommended fix path.

Need a Similar Engagement?

Our ISO/IEC 27001:2022 certified consultants deliver fixed-price, named-consultant engagements with executive-ready outcomes. Free 30-minute scoping call, instant response, no delay.

Book a Free Scoping Call

Results

Critical Findings

  • MTTR reduced 73% from 14 hours baseline to 3 hours 40 minutes average within 6 months
  • Median MTTR dropped from 6 hours to under 90 minutes
  • Tier 1 alert backlog at end of shift dropped to near zero, enabling proactive threat hunting

High & Medium Severity

Analyst time on enrichment reduced 80%, freeing 12+ hours per shift for hunting; same analyst headcount now handles 2.5x the alert volume; analyst pulse-survey satisfaction improved measurably; false positive recognition got faster (no more enrichment-then-realize-FP); alert quality improved with rich context on every incident.

Before vs. After

Before Engagement

  • 14 hours average MTTR
  • 60% false positive rate
  • Tier 1 swamped with enrichment work
  • Critical incidents lingering 3-5 days
  • No incident metrics dashboard
  • Tabletop exercises ad-hoc

After Remediation

  • 3 hours 40 minutes average MTTR
  • Under 30% false positive rate
  • Tier 1 doing hunting and judgment work
  • Critical incidents resolved same shift
  • Live metrics with monthly leadership review
  • Quarterly tabletop on rotating scenarios

"Our analysts went from drowning in enrichment to actually doing security work. The MTTR reduction was the headline number, but the real win was that nobody quit due to burnout that year."

Anonymous, SOC Manager, Indian SaaS enterprise

Key Lessons

What Other Teams Can Take Away

  • SOAR is not analyst replacement. It removes repetitive work so analysts can focus on judgment, hunting and incident command.
  • Playbook design is the real work. The SOAR platform is the easy part; mapping decision logic to automation is where 80% of effort lives.
  • Tiered governance matters. Keep humans in the loop for blast-radius actions (endpoint isolation, account disable, firewall block).
  • Measure everything. Analyst time saved, MTTR per incident type, automation success rate, escalation accuracy. Without metrics, SOAR becomes shelfware.

Conclusion

SOAR is not a SOC analyst replacement, it removes the repetitive work so analysts can focus on judgment, hunting and incident command. With well-designed playbooks and proper governance, SOAR delivers measurable MTTR improvements while keeping humans in the loop for high-stakes decisions.

For Indian enterprises with mature SOC operations, SOAR is the next investment after SIEM. Codesecure delivers SOAR implementation with named engineering leads, playbook design tailored to your environment, and managed SOC services with India-based analysts.

Want Outcomes Like These?

Codesecure is an ISO/IEC 27001:2022 certified cybersecurity firm. We deliver fixed-price engagements with named consultants and executive-ready outcomes across India, UAE, Saudi Arabia, Australia, Singapore and Maldives.

Get a Free Consultation Explore Our Services