[Gestão]

Security Orchestration: CACAO Playbooks

Argus implements CACAO v2.0 (Collaborative Automated Course of Action Operations), the OASIS standard for describing and sharing cybersecurity playbooks.

Metadados do modulo

Argus implements CACAO v2.0 (Collaborative Automated Course of Action Operations), the OASIS standard for describing and sharing cybersecurity playbooks.

Voltar a Todos os Módulos

Referencia de origem

content/modules/security-cacao-playbooks.md

Última Atualização

18 de mar. de 2026

Categoria

Gestão

Checksum do conteudo

887b7ca258557cf0

Etiquetas

management

Documentacao renderizada

Esta pagina renderiza o Markdown e Mermaid do modulo diretamente da fonte publica de documentacao.

Overview#

Argus implements CACAO v2.0 (Collaborative Automated Course of Action Operations), the OASIS standard for describing and sharing cybersecurity playbooks. CACAO playbooks define structured response workflows -- from initial triage through containment and recovery -- as machine-readable JSON that can be imported, stored, executed, and shared across organisations. Argus adds OpenC2 command execution support, allowing CACAO workflow steps to trigger automated response actions against connected security tools.

Key Features#

CACAO v2.0 Playbook Import#

Submit CACAO playbooks as JSON via the

importCacaoPlaybook
mutation. The service validates the document structure against the CACAO v2.0 schema, parses playbook metadata (name, description, type, created, modified, playbook variables), and persists the canonical JSON alongside extracted metadata to PostgreSQL. Invalid playbooks are rejected with structured validation errors before any storage occurs.

OpenC2 Command Execution#

CACAO workflow steps of type

action
with an OpenC2 command target can be executed directly from Argus via the
OpenC2Client
. This enables automated responses -- blocking an IP on a firewall, isolating a host, or revoking a session token -- triggered by CACAO step execution without manual intervention. OpenC2 actuator endpoints are configured per organisation.

CACAO Bundle Export#

Export stored playbooks as standards-compliant CACAO v2.0 JSON bundles via the

exportCacaoPlaybook
mutation. The
build_cacao_export
adapter serialises the stored playbook record back to the CACAO format, ready for sharing with partner organisations via MISP, STIX bundles, or direct exchange. Each export is logged as an interop export audit event.

Clearance-Filtered Playbook Listing#

The playbook inventory enforces row-level secrecy filtering so that playbooks tagged SECRET or above are invisible to analysts with lower clearance. This allows a shared playbook library to contain response procedures across multiple classification levels, each visible only to cleared personnel.

Playbook Status and Versioning#

Playbooks carry status metadata (draft, verified, deprecated), version strings, and author information from the CACAO specification. The listing query supports filtering by status to separate production-ready playbooks from drafts under review.

Use Cases#

  • Ransomware Response Automation: Import a CACAO playbook defining ransomware containment steps and use OpenC2 execution to automatically isolate confirmed infected hosts the moment an indication is confirmed.
  • Intel-Driven Response: Link a CACAO playbook to a Sigma rule or MISP indicator set -- when a detection fires, the associated playbook provides the verified response procedure for the analyst to execute or automate.
  • Cross-Agency Playbook Sharing: Export verified incident response playbooks as CACAO bundles and share with partner CERTs or allied organisations in a machine-readable format they can import into their own platforms.
  • Compliance Exercise Automation: Run tabletop exercises using CACAO playbooks with OpenC2 execution against sandbox environments to validate response procedures before operational use.

Integration#

Available via GraphQL with queries for playbook listing and statistics, and mutations for import, export, step execution, and schema validation. All operations require authentication and organisation scoping.

Implements OASIS CACAO v2.0 specification. OpenC2 command execution follows the OpenC2 Language Specification v1.0. Works alongside the Playbooks domain (for Argus-native playbooks), MISP and STIX integrations (for intelligence-linked response), and the Sigma rules engine (for detection-triggered playbook activation).

Last Reviewed: 2026-03-18