Skip to main content

Incident Triage Matrix

The incident triage matrix provides classification criteria for determining incident severity, assigning priority, and routing incidents to the appropriate response playbook. Use this reference during initial incident assessment to ensure consistent classification across responders.

Incident categories

Incidents fall into distinct categories based on their primary characteristic. Each category routes to specific playbooks and may have different severity thresholds.

CategoryDefinitionPrimary indicatorsInitial playbook
Security: MalwareMalicious software detected on endpoints or serversAV/EDR alerts, suspicious processes, unusual network trafficMalware Containment
Security: RansomwareEncryption malware affecting data availabilityRansom notes, encrypted files, mass file modificationRansomware Response
Security: Account compromiseUnauthorised access to user accountsImpossible travel, credential stuffing alerts, user reportAccount Compromise
Security: Privileged access breachCompromise of administrative accountsAdmin credential exposure, suspicious privileged activityPrivileged Access Breach
Security: PhishingEmail-based attack campaign targeting usersUser reports, mail gateway alerts, similar messages to multiple usersPhishing Campaign Response
Security: Data breachConfirmed or suspected data exfiltrationDLP alerts, data found externally, unusual data access patternsData Breach Response
Security: Protection data breachBreach involving safeguarding or case management dataProtection case data exposed, safeguarding records accessedProtection Data Breach Response
Security: Web application attackAttacks targeting web applicationsWAF alerts, injection attempts, application errorsWeb Application Attack
Security: Insider threatSuspected malicious insider activityData exfiltration patterns, policy violations, HR referralInsider Threat Investigation
Security: Device lossLost or stolen device containing organisational dataUser report, device tracking lossDevice Loss or Theft
Availability: Service outageCritical service unavailable to usersMonitoring alerts, user reports, health check failuresMajor Service Outage
Availability: Infrastructure failurePhysical or virtual infrastructure component failureHardware alerts, hypervisor errors, storage failuresInfrastructure Recovery
Availability: Cloud failureCloud service or region unavailabilityCloud provider status, region-wide errorsCloud Failover

Severity levels

Severity reflects the actual or potential impact of an incident on organisational operations, data, and people. Assign severity based on the highest applicable criterion.

Critical: Severity 1

Immediate threat to organisational operations, safety, or data requiring emergency response.

CriterionThreshold
Service impactCore business services unavailable to all users
Data impactConfirmed exfiltration of protection data, PII of more than 1,000 individuals, or financial data
Financial impactPotential loss exceeding £100,000
Safety impactDirect threat to physical safety of staff or beneficiaries
Reputational impactIncident will become public knowledge within 24 hours
Regulatory impactMandatory breach notification triggered (GDPR 72-hour clock started)
Spread potentialActive ransomware encryption in progress, worm-like propagation

High: Severity 2

Significant impact requiring urgent response within working hours or limited after-hours escalation.

CriterionThreshold
Service impactCore business service degraded affecting more than 50% of users, or non-core service unavailable
Data impactSuspected exfiltration, confirmed access to sensitive data without exfiltration confirmation
Financial impactPotential loss between £10,000 and £100,000
Safety impactPotential indirect threat to safety through compromised communications or data
Reputational impactIncident affects external stakeholders (partners, donors, beneficiaries)
Regulatory impactPotential regulatory notification required pending investigation
Spread potentialMalware contained but cleanup incomplete, compromised credentials not yet fully rotated

Medium: Severity 3

Moderate impact manageable within standard working hours with established procedures.

CriterionThreshold
Service impactNon-core service degraded, or localised outage affecting single office or team
Data impactUnauthorised access attempt blocked, policy violation without data exposure
Financial impactPotential loss between £1,000 and £10,000
Safety impactNo safety implications
Reputational impactInternal impact only
Regulatory impactNo regulatory notification required
Spread potentialIsolated incident with no propagation indicators

Low: Severity 4

Minor impact handled through standard service management processes.

CriterionThreshold
Service impactSingle user affected, cosmetic issues, minor functionality problems
Data impactFailed attack with no access achieved
Financial impactPotential loss under £1,000
Safety impactNone
Reputational impactNone
Regulatory impactNone
Spread potentialNone

Priority matrix

Priority determines response urgency and resource allocation. Calculate priority from severity and urgency using the matrix below. Urgency measures how quickly the incident impact grows or the window for effective response closes.

Urgency levels

UrgencyDefinitionExamples
ImmediateImpact growing every minute, response window under 1 hourActive ransomware encryption, ongoing data exfiltration, service outage during critical operations
HighImpact growing hourly, response window under 4 hoursCompromised credentials in use, phishing campaign actively receiving clicks, degraded service during business hours
MediumImpact stable or growing slowly, response window under 24 hoursContained malware awaiting cleanup, suspected breach requiring investigation, weekend service degradation
LowNo time pressure, can be scheduledFailed attack logged for analysis, minor policy violation, cosmetic issues

Priority calculation

Immediate urgencyHigh urgencyMedium urgencyLow urgency
Critical severityP1P1P2P2
High severityP1P2P2P3
Medium severityP2P2P3P3
Low severityP3P3P4P4

Response requirements by priority

Each priority level carries specific response time and resource commitments.

PriorityInitial responseStatus updatesResolution targetStaffing model
P115 minutesEvery 30 minutes until stable, then hourly4 hours to stable stateIncident commander plus dedicated team, 24/7 coverage until resolved
P21 hourEvery 2 hours during business hours8 hours to stable stateAssigned responder with backup, extended hours as needed
P34 hoursDaily during active investigation3 business daysAssigned responder during business hours
P41 business dayOn status change10 business daysNormal queue processing

Initial response means acknowledging the incident, assigning ownership, and beginning assessment. Stable state means active threat contained, immediate impact mitigated, and no further deterioration expected without change.

Escalation triggers

Escalate to the next priority level when any trigger condition occurs during incident handling.

Escalate from P2 to P1

TriggerAction
Scope expansionIncident affects additional systems, offices, or data beyond initial assessment
Exfiltration confirmedEvidence of data leaving organisational control
Regulatory clockDiscovery triggers mandatory notification timeline
Recovery failurePlanned remediation unsuccessful after 2 attempts
Executive involvementMedia inquiry, donor inquiry, or board notification required
Safety concernAny indication of physical safety implications

Escalate from P3 to P2

TriggerAction
User impact growthAffected user count doubles or exceeds 50
Persistence discoveredAttacker established persistence mechanisms
Lateral movementEvidence of movement between systems
Time sensitivityExternal deadline creates urgency (audit, go-live, emergency response)
Resource constraintResolution blocked by unavailable resources or expertise

Escalate from P4 to P3

TriggerAction
Pattern identifiedSimilar incidents indicate coordinated activity
Repeat occurrenceSame incident type for same user or system within 30 days
Policy violationInvestigation reveals deliberate policy circumvention

Communication requirements

Communication recipients and channels vary by priority level. The incident commander (P1) or assigned responder (P2-P4) owns communication delivery.

P1 incidents

RecipientTimingChannelContent
Executive leadershipWithin 30 minutes of classificationPhone call, then emailNature, impact, actions in progress, next update time
IT leadershipWithin 15 minutesPhone call or instant messageFull technical details, resource needs
Affected department headsWithin 1 hourPhone callImpact on their operations, expected duration, workarounds
All staff (if service impact)Within 2 hoursEmail and intranetService status, workarounds, expected resolution
External parties (donors, partners)As determined by executivePer relationship protocolApproved messaging only
Regulatory authoritiesPer regulatory timelineFormal notificationLegal-reviewed content

P2 incidents

RecipientTimingChannelContent
IT leadershipWithin 2 hoursEmailSummary, impact, timeline
Affected department headsWithin 4 hoursEmailImpact and workarounds
Affected usersAs neededEmailService status, workarounds

P3 and P4 incidents

RecipientTimingChannelContent
Affected usersOn resolutionEmail or ticket updateResolution confirmation, prevention guidance
IT leadershipWeekly summaryReportAggregated incident metrics

Category-specific classification

Some incident categories have specific severity criteria that override general thresholds.

Ransomware severity

ConditionMinimum severity
Encryption active and spreadingCritical
Encryption stopped, cleanup requiredHigh
Ransomware detected, execution preventedMedium

Account compromise severity

ConditionMinimum severity
Privileged account compromisedCritical
Account with access to protection dataCritical
Account with access to financial systemsHigh
Standard user accountMedium
Failed compromise attemptLow

Data breach severity

Data typeRecordsMinimum severity
Protection/safeguarding dataAnyCritical
Financial data (payment cards, bank details)AnyCritical
PII (names with identifiers)Over 1,000Critical
PII (names with identifiers)100-1,000High
PII (names with identifiers)Under 100Medium
Internal operational dataAnyMedium
Public dataAnyLow

Device loss severity

ConditionMinimum severity
Device with protection data, unencryptedCritical
Device with protection data, encryptedHigh
Device with PII, unencryptedHigh
Device with PII, encryptedMedium
Device with standard data, encryptedLow

Service outage severity

Service typeUser impactMinimum severity
Core service (email, ERP, case management)All usersCritical
Core serviceOver 50% of usersHigh
Core serviceUnder 50% of usersMedium
Supporting serviceAll usersHigh
Supporting servicePartialMedium
Non-critical serviceAnyLow

Worked examples

Example 1: Ransomware detection

Situation: EDR alerts on 3 endpoints showing encryption behaviour at 14:30 on Tuesday. Files with .locked extension appearing in shared drives.

Classification:

  • Category: Security: Ransomware (encryption indicators)
  • Severity: Critical (active encryption spreading)
  • Urgency: Immediate (impact growing every minute)
  • Priority: P1

Routing: Ransomware Response

Response requirements: 15-minute initial response, incident commander assigned, 24/7 coverage until contained.

Example 2: Phishing report

Situation: User reports suspicious email at 09:15. Email contains link to credential harvesting site. User did not click. Mail gateway shows same email sent to 45 recipients.

Classification:

  • Category: Security: Phishing (campaign targeting multiple users)
  • Severity: High (multiple users targeted, potential for credential compromise)
  • Urgency: High (other users may click, response window under 4 hours)
  • Priority: P2

Routing: Phishing Campaign Response

Response requirements: 1-hour initial response, message quarantine, recipient notification.

Example 3: Laptop theft

Situation: Staff member reports laptop stolen from vehicle on Saturday evening. Laptop has full disk encryption enabled. Contains programme data including beneficiary names and locations for food distribution.

Classification:

  • Category: Security: Device loss
  • Severity: High (PII present, encryption provides protection but not certainty)
  • Urgency: Medium (theft already occurred, no active threat, response window under 24 hours)
  • Priority: P2

Routing: Device Loss or Theft

Response requirements: 1-hour initial response (next business day given weekend), remote wipe, access review.

Example 4: Email service degradation

Situation: Users report slow email delivery starting at 11:00 Monday. Messages taking 15-30 minutes to deliver. Approximately 200 users affected across headquarters.

Classification:

  • Category: Availability: Service outage (core service degraded)
  • Severity: Medium (service degraded not unavailable, HQ only)
  • Urgency: High (business hours, impact ongoing)
  • Priority: P2

Routing: Major Service Outage for investigation, escalate if vendor issue to Service Continuity

Response requirements: 1-hour initial response, 2-hour status updates, investigate root cause.

Example 5: Failed brute force

Situation: SIEM alerts show 500 failed authentication attempts against single user account over 2 hours from multiple IP addresses. Account locked after 10 failures. No successful authentication.

Classification:

  • Category: Security: Account compromise (attack attempted)
  • Severity: Low (attack blocked, no access achieved)
  • Urgency: Low (no ongoing threat, attack unsuccessful)
  • Priority: P4

Routing: Log for analysis, no playbook activation required. If pattern repeats across accounts, escalate to Account Compromise.

Response requirements: Standard queue, verify account lockout, review for password spray pattern.

Example 6: Protection database access

Situation: Audit log review shows former contractor account accessed case management system 3 days after contract end. Account should have been disabled. Contractor viewed 12 protection cases before access was noticed and revoked.

Classification:

  • Category: Security: Data breach / Protection data breach
  • Severity: Critical (protection data accessed by unauthorised individual)
  • Urgency: High (access revoked but data exposure occurred, regulatory notification likely)
  • Priority: P1

Routing: Protection Data Breach Response

Response requirements: 15-minute response, safety assessment for affected cases, regulatory notification assessment, safeguarding team coordination.

Quick reference card

For printing or quick consultation during active incidents.

+--------------------------------------------------------------------+
| INCIDENT PRIORITY QUICK REFERENCE |
+--------------------------------------------------------------------+
| |
| SEVERITY INDICATORS |
| Critical: Safety threat, >1000 PII, active encryption, |
| all-user outage, regulatory notification |
| High: >50% user impact, sensitive data access, |
| £10-100k exposure, external stakeholder impact |
| Medium: Localised impact, blocked attacks, single office |
| Low: Single user, failed attacks, cosmetic issues |
| |
| URGENCY INDICATORS |
| Immediate: Impact growing per minute, <1hr response window |
| High: Impact growing hourly, <4hr response window |
| Medium: Stable impact, <24hr response window |
| Low: No time pressure, schedulable |
| |
| PRIORITY = SEVERITY x URGENCY |
| P1: Critical+Immediate/High, High+Immediate |
| P2: Critical+Medium/Low, High+High/Medium, Medium+Immediate/High |
| P3: High+Low, Medium+Medium/Low, Low+Immediate/High |
| P4: Low+Medium/Low |
| |
| RESPONSE TIMES |
| P1: 15 min initial, 30 min updates, 4hr stable |
| P2: 1 hr initial, 2hr updates, 8hr stable |
| P3: 4 hr initial, daily updates, 3 day resolution |
| P4: 1 day initial, on-change updates, 10 day resolution |
| |
+--------------------------------------------------------------------+

See also