Incident Severity Matrix¶
Document ID: SEV-MATRIX-001
Version: 1.0
Last Updated: 2026-02-15
Owner: SOC Manager
Purpose¶
This matrix defines the severity classification (P1–P4) for all security incidents handled by the SOC. It standardizes response times, escalation paths, and team assignments to ensure consistent and timely incident handling.
Severity Levels Overview¶
| Priority | Severity | Impact | Examples |
|---|---|---|---|
| 🔴 P1 | Critical | Business-stopping, data breach in progress, active ransomware | Ransomware encryption active, confirmed data exfiltration, critical infrastructure compromise, active APT intrusion |
| 🟠 P2 | High | Significant impact, potential data loss, service degradation | Account compromise with lateral movement, malware outbreak (>5 hosts), DDoS affecting production, insider threat confirmed |
| 🟡 P3 | Medium | Limited impact, contained threat, single-system compromise | Single endpoint malware, phishing (credentials entered but reset), unauthorized access attempt blocked, suspicious DNS activity |
| 🟢 P4 | Low | Minimal impact, informational, policy violation | Failed login attempts, policy violation (USB usage), low-confidence alert, vulnerability scan detected |
Service Level Agreements (SLA)¶
| Metric | 🔴 P1 Critical | 🟠 P2 High | 🟡 P3 Medium | 🟢 P4 Low |
|---|---|---|---|---|
| Acknowledgment | ≤ 5 min | ≤ 15 min | ≤ 1 hour | ≤ 4 hours |
| Initial Triage | ≤ 15 min | ≤ 30 min | ≤ 2 hours | ≤ 8 hours |
| Containment Start | ≤ 30 min | ≤ 1 hour | ≤ 4 hours | Next business day |
| Status Update Frequency | Every 30 min | Every 1 hour | Every 4 hours | Daily |
| Resolution Target | ≤ 4 hours | ≤ 8 hours | ≤ 24 hours | ≤ 72 hours |
| Post-Incident Review | Within 24 hours | Within 48 hours | Within 1 week | Monthly batch review |
Escalation Matrix¶
P1 — Critical¶
┌─────────────────────────────────────────────────────────────────┐
│ T+0 min │ SOC Analyst (Tier 1) detects & acknowledges │
│ T+5 min │ Escalate → Tier 2 Analyst + SOC Lead │
│ T+15 min │ Escalate → Incident Commander + CISO │
│ T+30 min │ Notify → CTO / CEO / Legal / PR (if data breach) │
│ T+60 min │ Activate → Full IR Team + External DFIR (if needed)│
└─────────────────────────────────────────────────────────────────┘
P2 — High¶
┌─────────────────────────────────────────────────────────────────┐
│ T+0 min │ SOC Analyst (Tier 1) detects & acknowledges │
│ T+15 min │ Escalate → Tier 2 Analyst │
│ T+30 min │ Escalate → SOC Lead │
│ T+2 hours │ Notify → SOC Manager + CISO (if not contained) │
└─────────────────────────────────────────────────────────────────┘
P3 — Medium¶
┌─────────────────────────────────────────────────────────────────┐
│ T+0 min │ SOC Analyst (Tier 1) detects & acknowledges │
│ T+1 hour │ Triage and investigate │
│ T+4 hours │ Escalate → Tier 2 (if complex or unresolved) │
└─────────────────────────────────────────────────────────────────┘
P4 — Low¶
┌─────────────────────────────────────────────────────────────────┐
│ T+0 │ SOC Analyst (Tier 1) detects & acknowledges │
│ T+8 hours │ Investigate during normal working hours │
│ Monthly │ Batch review with SOC Lead │
└─────────────────────────────────────────────────────────────────┘
Response Team Composition¶
| Role | P1 | P2 | P3 | P4 |
|---|---|---|---|---|
| SOC Analyst (Tier 1) | ✅ | ✅ | ✅ | ✅ |
| SOC Analyst (Tier 2) | ✅ | ✅ | On-demand | — |
| SOC Lead | ✅ | ✅ | — | — |
| Incident Commander | ✅ | On-demand | — | — |
| CISO | ✅ | Notify | — | — |
| IT Operations | ✅ | ✅ | On-demand | — |
| Legal / Compliance | ✅ (if PII) | On-demand | — | — |
| PR / Communications | ✅ (if public) | — | — | — |
| External DFIR | On-demand | — | — | — |
Severity Classification Decision Tree¶
graph TD
A[New Alert / Incident] --> B{Active data destruction<br>or exfiltration?}
B -->|Yes| P1[🔴 P1 Critical]
B -->|No| C{Multiple systems<br>affected?}
C -->|Yes| D{Business service<br>impacted?}
D -->|Yes| P2H[🟠 P2 High]
D -->|No| E{Lateral movement<br>detected?}
E -->|Yes| P2H
E -->|No| P3M[🟡 P3 Medium]
C -->|No| F{Confirmed<br>compromise?}
F -->|Yes| G{Credentials or<br>sensitive data?}
G -->|Yes| P2H
G -->|No| P3M
F -->|No| H{Blocked by<br>controls?}
H -->|Yes| P4L[🟢 P4 Low]
H -->|No| P3M
Communication Templates¶
P1 Initial Notification (to Management)¶
SUBJECT: [P1-CRITICAL] Security Incident — Immediate Action Required
INCIDENT ID: INC-YYYY-XXXX
SEVERITY: P1 — CRITICAL
TIME DETECTED: [timestamp]
AFFECTED SYSTEMS: [list]
CURRENT STATUS: [Triage | Containment | Eradication]
SUMMARY:
[Brief description of what happened]
IMMEDIATE ACTIONS TAKEN:
1. [Action 1]
2. [Action 2]
NEXT UPDATE: [timestamp — within 30 minutes]
INCIDENT COMMANDER: [Name]
CONTACT: [Phone/Slack]
P2–P4 Status Update¶
SUBJECT: [P2-HIGH] Incident Update — INC-YYYY-XXXX
STATUS: [In Progress | Contained | Resolved]
TIME ELAPSED: [X hours since detection]
PROGRESS:
- [What was done since last update]
NEXT STEPS:
- [Planned actions]
NEXT UPDATE: [timestamp]
Severity Reclassification¶
Incidents may be upgraded or downgraded during investigation:
| Trigger | Action |
|---|---|
| Lateral movement discovered | Upgrade to P1 or P2 |
| Data exfiltration confirmed | Upgrade to P1 |
| Threat contained, no spread | Downgrade one level |
| False positive confirmed | Close or downgrade to P4 |
| Additional systems compromised | Upgrade one level |
| Regulatory data (PII/PHI) involved | Minimum P2 |
Rule: Any severity change must be documented in the incident ticket with justification.
Related Documents¶
- Incident Response Playbooks
- Shift Handover Template
- Incident Report Template
- MITRE ATT&CK Coverage Heatmap