Alert Triage Workflow
The alert triage workflow is the core SOC procedure. Every new alert moves through a defined lifecycle from detection to resolution.
Alert Lifecycle
New → Acknowledged → Investigating → [Escalated →] Resolved ↘ Closed (false positive)1. New
An alert enters the queue in New state. It appears at the top of the alert feed sorted by severity.
SLA clock starts when the alert is created.
2. Acknowledged
Pressing A or clicking Acknowledge assigns the alert to the current analyst and starts the investigation timer.
Action: Acknowledge within the SLA window for the severity level.
3. Investigating
The analyst is actively working the alert. The investigation panel is open. Evidence is being collected.
Actions:
- Open related logs:
L - Run a linked playbook:
P - Add investigation notes:
N - View AI system context:
C
4. Escalated
The alert requires senior analyst or IR team involvement.
Escalation triggers:
- Confirmed security incident (prompt injection, data exfiltration)
- Alert affects a critical AI system
- Alert has not progressed in 2× SLA time
- Policy violation at board-reportable severity
Action: Press E to escalate. Select escalation path (SOC Lead, IR Team, CISO).
5. Resolved
The alert has been addressed. The AI system behavior has returned to normal or the threat has been contained.
Required before resolution:
- Root cause documented
- Affected systems identified
- Remediation action taken or scheduled
- SIEM/ticketing system updated
Action: Press R to resolve. Fill resolution form.
Closed (False Positive)
The alert was not a genuine governance violation or security event.
Action: Press X to close. Select false positive reason from dropdown. Optionally suppress similar alerts for 24h.
Triage Decision Tree
1. Read the alert summary and severity2. Is this a known benign pattern? → Close as false positive3. Is this policy violation or security event? - Policy violation → investigate per playbook, no escalation required - Security event → immediate escalation4. Acknowledge the alert5. Open investigation panel (Tab or click)6. Review: - Alert context (what was the AI input/output?) - Historical alerts for this system - System assessment score - Recent score changes7. Determine root cause8. Take remediation action or escalate9. Document and resolveInvestigation Panel
The investigation panel opens when you select an alert. It contains:
| Section | Content |
|---|---|
| Summary | Alert type, severity, system affected, time |
| Evidence | The triggering input/output, policy that fired |
| Context | AI system details, assessment score, recent events |
| History | Previous alerts for this system (last 30 days) |
| Notes | Analyst investigation notes (markdown) |
| Actions | Acknowledge, Escalate, Resolve, Close, Suppress |
| Playbooks | Linked response playbooks for this alert type |
Resolution Form
When resolving an alert, complete the resolution form:
- Root cause — what caused the alert?
- Impact — what systems or data were affected?
- Remediation — what action was taken?
- Prevention — is a policy or rule change needed?
- Ticket ID — linked incident ticket (optional)
Resolution data feeds into the weekly SOC metrics report and SIEM correlation.