Decision

Security Incident Response Decision

The recurring judgment point where the security team determines the appropriate response to a detected threat — evaluating threat severity, confidence level, affected systems, containment options (isolate, block, quarantine), business impact of each response action, and the escalation criteria for invoking incident response plans.

Last updated: February 2026Data current as of: February 2026

Why This Object Matters for AI

AI cannot automate threat response or recommend containment actions without explicit response criteria; without them, every security alert requires a senior analyst to manually assess 'is this real and what should we do' while the attacker continues operating.

Information Technology & Infrastructure Capacity Profile

Typical CMC levels for information technology & infrastructure in Manufacturing organizations.

Formality
L2
Capture
L2
Structure
L2
Accessibility
L2
Maintenance
L2
Integration
L2

CMC Dimension Scenarios

What each CMC level looks like specifically for Security Incident Response Decision. Baseline level is highlighted.

L0

Incident response decisions are entirely ad-hoc — when an alert fires, whoever sees it first decides what to do based on their experience and instincts.

None — AI has no response decision criteria to reason about.

Document basic incident response criteria defining severity classifications, initial containment options, and escalation thresholds.

L1

A general incident response plan exists in a PDF, but response decisions still depend on the analyst's judgment — the plan covers 'what to do for a breach' but not 'how to evaluate this specific alert.'

Can reference the response plan but cannot map it to specific alert types or compute recommended actions for a given event.

Define structured response playbooks for major alert categories specifying containment options, impact assessment steps, and escalation criteria per threat type.

L2Current Baseline

Response playbooks exist for major alert categories (malware, phishing, unauthorized access), but they describe general steps without factoring in the confidence level of detection or business impact of containment actions.

Can suggest the relevant playbook for an alert category but cannot weigh detection confidence against business impact of containment.

Incorporate detection confidence scoring, business impact assessment criteria, and containment action trade-offs into each response playbook.

L3

Response playbooks include detection confidence thresholds, business impact tiers for affected systems, containment options ranked by disruption level, and escalation criteria factoring both threat severity and business criticality.

Can recommend containment actions balancing threat severity, detection confidence, and business impact, and escalate appropriately based on documented criteria.

Encode response decision logic in machine-readable rules with validated inputs, automated containment action selection, and exception handling workflows.

L4

Machine-readable rules encode response logic with validated inputs — threat indicators, detection confidence, asset criticality, business impact — selecting containment actions automatically with human approval gates.

Can auto-select and stage containment actions, compute business impact predictions, and route escalation decisions with full audit trails.

Deploy adaptive response logic that learns from incident outcomes, adjusts containment strategies based on effectiveness data, and refines escalation thresholds in real time.

L5

Adaptive response logic learns from incident outcomes — containment effectiveness scored, escalation thresholds refined, and new response patterns incorporated as threat tactics evolve.

Can autonomously manage incident response — detection, containment, escalation, and post-incident learning — with continuous strategy refinement.

Ceiling of the CMC framework for this dimension.

Capabilities That Depend on Security Incident Response Decision

Other Objects in Information Technology & Infrastructure

Related business objects in the same function area.

IT Asset Inventory

Entity

The comprehensive registry of all IT assets — servers, workstations, network devices, cloud instances, and installed software including hardware specifications, operating system versions, patch levels, warranty status, assigned owner, and the relationships between assets that form the configuration management database (CMDB).

IT Service Ticket

Entity

The transactional record for each IT incident or service request — containing the reported issue, affected system, priority, category, assigned technician, resolution steps taken, time to resolution, root cause code, and user satisfaction rating tracked through the ITSM lifecycle.

Network and Infrastructure Topology

Entity

The structured map of how IT systems interconnect — defining network segments, VLANs, firewall zones, cloud VPCs, load balancer configurations, DNS records, and the dependency chains that show which applications rely on which infrastructure components.

User Identity and Access Profile

Entity

The managed record of each user's digital identity — containing authentication credentials, role assignments, group memberships, application entitlements, access request history, last login timestamps, and the privilege escalation audit trail maintained by identity and access management (IAM) systems.

Software License Portfolio

Entity

The managed inventory of software entitlements — containing license types (perpetual, subscription, usage-based), quantities purchased, quantities deployed, renewal dates, cost per license, vendor contract references, and the compliance position showing over- or under-deployment per product.

Security Threat Intelligence

Entity

The curated collection of known threat indicators, attack patterns, and vulnerability data — containing indicators of compromise (IOCs), Common Vulnerabilities and Exposures (CVEs), threat actor profiles, attack technique mappings (MITRE ATT&CK), and the risk scores that contextualize threats to the organization's specific environment.

Patch Deployment Priority Decision

Decision

The recurring judgment point where IT operations evaluates which patches to deploy and in what order — weighing vulnerability severity (CVSS score), exploit availability, asset criticality, production impact risk, maintenance window constraints, and testing completion status.

Configuration Baseline Rule

Rule

The codified standard configurations for each asset class — defining approved OS versions, required security settings, mandatory agents, network configurations, and hardening standards (CIS benchmarks, STIG) that every system must comply with, along with the exception process for justified deviations.

Access Control Policy Rule

Rule

The codified rules governing who may access which systems under what conditions — defining role-based access templates, separation-of-duties constraints, privileged access requirements (MFA, just-in-time), periodic review schedules, and the automatic deprovisioning triggers for terminated or transferred employees.

IT Incident Management Process

Process

The end-to-end workflow governing how IT incidents are detected, triaged, escalated, resolved, and reviewed — defining severity classification criteria, response time SLAs per severity, escalation paths, communication templates, post-incident review requirements, and the knowledge base update triggers that capture resolution patterns.

What Can Your Organization Deploy?

Enter your context profile or request an assessment to see which capabilities your infrastructure supports.