Incident Response Escalation

Know when a vulnerability has become an incident question.

Use this guide when exploitation signals, telemetry, business impact, or dangerous exposure may require IR coordination instead of normal patch, mitigation, or monitoring work.

IR rule: do not call a vulnerability an incident without evidence of attempted exploitation, compromise, material exposure, or business-impact urgency. Do escalate when waiting for normal triage could hide active harm.

Evidenceobserved

Telemetry shows exploit attempts, suspicious behavior, post-exploit activity, or confirmed unauthorized access.

Exposuredangerous

Internet-facing, business-critical, unauthenticated, no-patch, or ransomware-relevant exposure overlaps with credible exploitation.

Decisionurgent

Containment, emergency change, service restriction, legal/comms review, or executive approval is needed quickly.

Unknownsmaterial

Telemetry gaps, owner gaps, unclear scope, or missing containment authority could allow active compromise to continue.

Criteria that should trigger incident-response coordination

Observed exploitation

Telemetry shows attempts against owned assets

Web, identity, endpoint, firewall, application, or cloud logs show exploit attempts, suspicious payloads, abnormal authentication, or post-exploit behavior tied to the vulnerable path.

Confirmed compromise

Evidence goes beyond vulnerability exposure

Indicators include unauthorized access, new persistence, webshells, suspicious processes, unusual tokens, lateral movement, data access, or attacker-controlled infrastructure.

Dangerous exposure

Credible exploit pressure meets critical reachability

KEV, active exploitation, public PoC, or ransomware relevance overlaps with internet-facing, unauthenticated, privileged, or business-critical systems.

Containment needed

Risk reduction may disrupt service

Isolation, access shutdown, account reset, feature disablement, emergency WAF rules, service removal, or forced patching needs coordinated authority and communications.

Scope unknown

Normal owners cannot bound the blast radius

Asset inventory, logs, business ownership, vendor scope, or affected-version evidence is too weak to rule out active harm across critical services.

Regulated impact possible

Legal, privacy, customer, or executive exposure may exist

Potential data access, customer-facing outage, safety risk, regulated environment impact, or public reporting concern requires incident governance.

Cases where IR activation is not yet supported

High score only

CVSS severity without exposure, exploitability, business impact, or telemetry evidence should drive triage, not incident declaration.

Public PoC with no environment fit

PoC increases urgency, but IR should depend on reachability, affected version, controls, telemetry, or suspicious activity.

Scanner finding without validation

Validate product, version, feature state, and reachability before treating the finding as active compromise or incident scope.

Vendor advisory alone

An advisory can trigger patch, mitigation, or monitoring, but incident claims need local evidence or clear business-impact urgency.

What to send when escalation is justified

Trigger

What changed: exploit attempt, confirmed compromise, KEV addition, public PoC, exposure discovery, containment need, or business impact.

Scope

Known assets, product/version, vulnerable path, business service, owner, exposure state, and unresolved asset groups.

Evidence

Log source, timestamp, indicator, payload, alert, affected version proof, source reference, and confidence level.

Ask

Containment decision, hunt request, forensic triage, emergency change, leadership update, vendor support, or legal/comms review.

Incident-response escalation note

IR escalation trigger: [observed exploitation / confirmed compromise / dangerous exposure / containment needed / regulated impact]
CVE/advisory: [ID and source]
Affected scope: [asset group, product, version, business service, owner]
Evidence observed: [log source, alert, timestamp, indicator, payload, behavior]
Current action: [patching, mitigation, isolation, monitoring, vendor case]
Decision needed: [containment / hunt / forensic triage / emergency change / leadership/legal/comms]
Known uncertainty: [scope gaps, telemetry gaps, vendor ambiguity, owner gaps]
Requested response time: [time/date]