Asi building-soc-escalation-matrix

Build a structured SOC escalation matrix defining severity tiers, response SLAs, escalation paths, and notification procedures for security incidents.

install
source · Clone the upstream repo
git clone https://github.com/plurigrid/asi
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/plurigrid/asi "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/asi/skills/building-soc-escalation-matrix" ~/.claude/skills/plurigrid-asi-building-soc-escalation-matrix && rm -rf "$T"
manifest: plugins/asi/skills/building-soc-escalation-matrix/SKILL.md
source content

Building SOC Escalation Matrix

Overview

A SOC escalation matrix defines how security incidents move through the organization based on severity, impact, and response requirements. Modern SOCs use context-driven escalation combining business risk, asset criticality, and data sensitivity rather than purely severity-based models. Organizations using AI and automation in their SOC cut detection-and-containment lifecycle to approximately 161 days, an 80-day improvement over the 241-day industry average.

When to Use

  • When deploying or configuring building soc escalation matrix capabilities in your environment
  • When establishing security controls aligned to compliance requirements
  • When building or improving security architecture for this domain
  • When conducting security assessments that require this implementation

Prerequisites

  • Familiarity with soc operations concepts and tools
  • Access to a test or lab environment for safe execution
  • Python 3.8+ with required dependencies installed
  • Appropriate authorization for any testing activities

SOC Tier Structure

Tier 1 - Alert Triage Analyst

  • Monitors SIEM dashboards and alert queues
  • Performs initial alert classification (true/false positive)
  • Handles P3 and P4 incidents to resolution
  • Escalates P1 and P2 incidents to Tier 2 within SLA
  • Documents initial findings in ticketing system

Tier 2 - Incident Analyst

  • Performs deep-dive investigation on escalated incidents
  • Conducts root cause analysis and scoping
  • Executes containment procedures
  • Handles P2 incidents to resolution
  • Escalates P1 incidents to Tier 3 or management

Tier 3 - Senior Analyst / Threat Hunter

  • Handles P1 critical incidents and APT investigations
  • Performs proactive threat hunting
  • Develops detection rules and playbooks
  • Conducts malware reverse engineering
  • Leads incident response for major breaches

Management Escalation

  • SOC Manager: Operational decisions, resource allocation
  • CISO: Business impact decisions, executive communication
  • Legal/PR: Data breach notification, media response
  • External IR: Third-party incident response engagement

Severity Classification

P1 - Critical

AttributeValue
ImpactActive data breach, ransomware spreading, critical systems compromised
Business ImpactRevenue loss, regulatory exposure, customer data at risk
Initial Response15 minutes
Escalation to Tier 2Immediate
Escalation to Management30 minutes
Resolution Target4 hours
CommunicationEvery 30 minutes to stakeholders
ExamplesActive ransomware, confirmed data exfiltration, domain admin compromise

P2 - High

AttributeValue
ImpactConfirmed compromise, limited scope, no active exfiltration
Business ImpactPotential revenue impact, contained risk
Initial Response30 minutes
Escalation to Tier 230 minutes if unresolved
Escalation to Management2 hours
Resolution Target8 hours
CommunicationEvery 2 hours to SOC management
ExamplesCompromised user account, malware on single endpoint, insider threat indicator

P3 - Medium

AttributeValue
ImpactSuspicious activity requiring investigation
Business ImpactLow immediate risk
Initial Response4 hours
Escalation to Tier 28 hours if unresolved
Resolution Target24 hours
CommunicationDaily status update
ExamplesPolicy violation, failed brute force, suspicious email report

P4 - Low

AttributeValue
ImpactInformational alerts, routine security events
Business ImpactMinimal
Initial Response8 hours
EscalationOnly if pattern emerges
Resolution Target72 hours
CommunicationWeekly summary
ExamplesVulnerability scan findings, expired certificates, policy exceptions

Escalation Decision Matrix

                    Asset Criticality
                    Low        Medium      High        Critical
Severity  Low      P4         P4          P3          P3
          Medium   P4         P3          P2          P2
          High     P3         P2          P2          P1
          Critical P2         P1          P1          P1

Context-Driven Escalation Triggers

Automatic Escalation (no analyst decision needed)

TriggerAction
Ransomware detected on any endpointP1 - Immediate Tier 3 + Management
Domain admin account compromiseP1 - Immediate Tier 3 + Management
Active data exfiltration to external IPP1 - Immediate Tier 3 + Management
Critical infrastructure (DC, SCADA) alertP1 - Immediate Tier 2 minimum
Executive account anomalyP2 - Immediate Tier 2
Multiple hosts with same malwareP1 - Immediate Tier 2

Time-Based Escalation

ConditionAction
P2 unresolved after 4 hoursEscalate to Tier 3
P3 unresolved after 12 hoursEscalate to Tier 2
Any incident unresolved past SLAEscalate to SOC Manager
P1 unresolved after 2 hoursEscalate to CISO

Communication Templates

P1 Initial Notification

SUBJECT: [P1 CRITICAL] Security Incident - {Incident_ID}

Incident Summary:
- Type: {incident_type}
- Affected Systems: {systems}
- Affected Users: {users}
- Current Status: {status}
- Assigned To: {analyst}

Impact Assessment:
- Business Impact: {impact}
- Data at Risk: {data_risk}
- Containment Status: {containment}

Next Actions:
- {action_1}
- {action_2}

Next Update: {time} (30-minute intervals)
Bridge Line: {conference_details}

Escalation Matrix Implementation

SOAR Integration

# XSOAR escalation playbook trigger
trigger:
  condition: incident.severity == "critical" AND incident.asset_criticality == "high"
  action:
    - assign_tier: 3
    - notify: [soc_manager, ciso]
    - create_war_room: true
    - start_bridge: true
    - set_sla: 4h

auto_escalation_rules:
  - name: P2 Time-Based Escalation
    condition: incident.severity == "high" AND incident.age > 4h AND incident.status != "resolved"
    action:
      - escalate_tier: 3
      - notify: soc_manager
      - add_comment: "Auto-escalated due to SLA breach"

References