Information Security 8 min read

SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap

iQIYI’s SOAR platform, built on StackStorm and the Walkoff visual editor, integrates security components, scripts, chat‑ops bots, and a mini‑program to automate detection and response, cutting MTTR by roughly 75% across high‑frequency routine tasks and low‑frequency critical incidents while planning broader coverage and knowledge‑base expansion.

iQIYI Technical Product Team
iQIYI Technical Product Team
iQIYI Technical Product Team
SOAR (Security Orchestration, Automation and Response) Implementation at iQIYI: Architecture, Scenarios, and Roadmap

SOAR (Security Orchestration, Automation and Response) was first introduced by Gartner in 2015. It aims to improve security operations by automating detection, analysis, and response.

Security teams often face a shortage of personnel and increasing complexity of threats, leading to high MTTD (Mean Time to Detect) and low detection rates. SOAR addresses these challenges by shifting interaction from humans to security tools, reducing MTTR (Mean Time to Respond) and increasing operational productivity.

iQIYI’s SOAR system integrates several core components: a workflow engine, a graphical orchestration module, security components and scripts, an IM bot, and a mini‑program. The overall architecture is illustrated below.

The workflow engine is built on StackStorm, a modular, horizontally scalable orchestration platform that provides a web UI, CLI, and REST API. StackStorm’s advantages include YAML‑based workflow definition, webhook and sensor support, Python integration, and conditional logic (fork/join) suitable for security workflows.

Key StackStorm workflow steps:

Sensor detects and triggers an event.

Rules Engine matches the event against policies and creates a task.

Worker executes the task, typically invoking external security services.

StackStorm records audit details of the task execution.

The result is fed back to the Rules Engine for further processing.

For graphical orchestration, iQIYI integrated the open‑source Walkoff front‑end, providing a drag‑and‑drop workflow editor.

Security components correspond to StackStorm actions, wrapped in Python to interface with existing security services. Security scripts correspond to StackStorm workflows, reusing components to improve development efficiency. Version control and rollback are handled via GitLab.

Two main deployment scenarios are covered:

High‑frequency scenario : Routine operational tasks with lower security level but high repetition, such as automatic verification of vulnerability tickets after a fix.

Low‑frequency scenario : High‑severity incidents requiring rapid, automated response, e.g., automatic investigation of service intrusions or high‑risk vulnerability alerts.

Metrics demonstrated a ~75% reduction in MTTR after SOAR adoption at iQIYI.

Current progress includes the implementation of 35 security components, 11 security scripts, and 17 service integrations, along with mobile mini‑programs and chat‑ops bots for on‑the‑go incident handling.

Future roadmap focuses on expanding component coverage, building a case and knowledge base for intelligent analysis, and refining metric accuracy to drive data‑based decisions.

References include articles on SOAR implementations, workflow engines, and related open‑source projects such as Walkoff.

Incident ResponseWorkflow EngineSecurity Automationsecurity operationsSOARStackStorm
iQIYI Technical Product Team
Written by

iQIYI Technical Product Team

The technical product team of iQIYI

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.