1.4 Escalation Framework
Escalation Framework
Introduction
Escalation is the mechanism that routes incidents from the person who detected them to the person who can resolve them. A well-defined escalation framework answers three questions at every point in an investigation: (1) Does this need to go higher? (2) Who does it go to? (3) How quickly?
Without a framework, escalation is ad hoc — the analyst either escalates everything (overwhelming senior staff) or escalates nothing (sitting on critical incidents they cannot resolve). Both failure modes are common and both are preventable.
Escalation triggers
Escalation is triggered by specific, observable conditions — not by subjective assessment of “how bad it looks.”
Escalate from T1 to T2 when:
- Triage indicates a potential true positive (the playbook triage checks do not definitively rule out compromise)
- The alert involves a high-value account (executive, administrator, finance, HR)
- The alert involves multiple correlated detections for the same entity
- The T1 analyst has completed triage checks and the playbook directs “proceed to investigation” (which requires T2 skills)
- The T1 analyst is uncertain about classification and needs a second opinion
Escalate from T2 to T3 / SOC Manager when:
- The incident involves more than 3 compromised accounts (campaign-scale)
- The incident involves lateral movement or privilege escalation beyond identity compromise
- Containment requires high-blast-radius actions (account disablement, device isolation, KRBTGT reset)
- The investigation reveals data exfiltration or potential regulatory notification
- The incident requires external communication (vendor notification, customer notification, law enforcement)
- The T2 analyst’s investigation has been running for more than 4 hours without resolution
Escalate to CISO / Executive leadership when:
- Incident is classified Critical
- Confirmed data breach involving customer or regulated data
- Financial loss confirmed or likely
- Ransomware with active encryption
- Incident involves executive accounts or sensitive business functions
- Media or public attention is likely
The escalation matrix
The escalation matrix is a reference document — posted in the SOC workspace, pinned in the team chat, and included in every playbook.
ESCALATION MATRIX
======================================================
Business hours (09:00-17:00 Mon-Fri):
Alert severity | First responder | Escalation path
Low | T1 analyst | → T2 if uncertain
Medium | T1 analyst | → T2 within 30 min
High | T2 analyst | → SOC Manager within 15 min
Critical | T2 analyst | → SOC Manager immediately
| → CISO within 30 min
After hours (17:00-09:00 and weekends):
Alert severity | First responder | Escalation path
Low | MDR provider | Hold for morning handover
Medium | MDR provider | Triage and escalate if TP
High | MDR provider | → On-call analyst within 15 min
Critical | MDR provider | → On-call analyst immediately
| → SOC Manager within 15 min
On-call rotation:
- Week of [date]: [Name] — [phone number]
- Week of [date]: [Name] — [phone number]
CISO contact: [Name] — [phone number]
Legal contact: [Name] — [phone number]
IT Ops contact: [Name] — [phone number]
======================================================
Test the escalation path quarterly
An escalation matrix that has never been tested is an assumption, not a plan. Once per quarter, simulate a Critical severity incident after hours and verify: (1) The on-call analyst answers within the defined SLA. (2) The SOC manager can be reached. (3) The CISO contact information is current. (4) The MDR provider's escalation procedure works as contracted. Discovering that the on-call phone number is wrong during a real ransomware incident at 02:00 is a failure that should never happen.
Escalation communication format
When escalating, use a structured format so the receiving person immediately understands the situation:
The SBAR format (Situation, Background, Assessment, Recommendation):
Situation: DET-SOC-008 and DET-SOC-009 fired for the CFO at 14:30.
Background: Inbox forwarding rule to a newly registered domain + evasion rule deleting messages with “wire transfer” in the subject. Sign-in from hosting provider IP in Ukraine at 14:22.
Assessment: High-confidence BEC compromise. Adversary has been in the mailbox for 8 minutes. Forwarding active — all incoming email being exfiltrated. Evasion rule targeting financial keywords suggests imminent payment fraud.
Recommendation: I have removed both inbox rules and revoked tokens. Requesting approval to force password reset and to contact the finance team about any recent payment change requests from the CFO.
This format takes 30 seconds to deliver and gives the receiving person everything they need to make a decision. Compare this to: “Hey, I have a weird alert for the CFO, can you take a look?” — which requires 5 minutes of back-and-forth before the senior person understands the situation.
Check your understanding
1. A T1 analyst receives a Critical severity alert at 22:00 (after hours). The escalation matrix says "MDR provider → On-call analyst immediately." The MDR provider has not triaged the alert — it came directly from Sentinel. The on-call analyst's phone goes to voicemail. What should the T1 do?
You're reading the free modules of SOC Operations
The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts. Premium subscribers get access to all courses.