Alert Triage
5 exercises — master alert triage vocabulary: the full acknowledge-assess-enrich-classify-act-document process, alert enrichment dimensions, P1–P4 severity classification and escalation phrases, how to professionally close a false positive with a tuning recommendation, and complete SOC case documentation structure.
0 / 5 completed
Alert triage quick reference
- Triage steps: Acknowledge → Assess → Enrich → Classify (TP/FP) → Act → Document.
- Enrichment dimensions: threat intel, asset context, user context, historical alert data, correlated alerts.
- P1 Critical (≤15min/page CISO) → P2 High (≤1h/Tier 2) → P3 Medium (≤4h/standard queue) → P4 Low (next business day).
- Closing as FP: document exactly WHY with evidence; include a specific suppression/tuning recommendation; risk-assess the exclusion.
- Case notes must include: header, initial assessment, timestamped investigation timeline, evidence, disposition (TP/FP/Indeterminate), actions taken, recommendations.
- Alert fatigue root cause: high FP rate → analysts stop trusting alerts → real threats missed. Solved by enrichment-driven triage and targeted rule tuning.
1 / 5
A new SOC analyst asks: "When a SIEM fires an alert, what exactly do I do? What does triage an alert mean step by step?"
Describe the core alert triage process in a SOC and what each step involves.
Structured triage prevents both missed threats (from rushing to close alerts) and wasted time (from escalating obvious false positives). Every step has a specific English vocabulary.
Triage process vocabulary:
Alert queue management vocabulary:
• Alert queue — the list of firing alerts awaiting analyst review; managed by priority/severity and age
• Queue depth — the number of unreviewed alerts; high queue depth = SOC under stress or rule quality issues
• Alert SLA — the time target for initial triage: e.g. "P1 alerts triaged within 15 minutes of firing"
• Alert ownership — assigning an alert to a specific analyst to ensure no alert is dropped or duplicated
Key vocabulary:
• Alert triage — the structured process of evaluating an alert's validity and required action: acknowledge → assess → enrich → classify → act → document
• Triage (noun, verb) — from medical triage; in SOC = prioritising and routing security events based on severity and context
• Alert fatigue — chronic analyst exhaustion caused by excessive FP alerts; leads to desensitisation and missed real threats
Triage process vocabulary:
| Step | Action | Key phrases |
|---|---|---|
| 1. Acknowledge | Assign alert to yourself in the queue | "I'm picking this up." / "Alert assigned to me." |
| 2. Assess | Read alert context: what fired, who/what is involved, severity | "The alert triggered on…" / "Involved asset is…" |
| 3. Enrich | Look up IP, user, asset in intel feeds and CMDB | "IP is flagged by VirusTotal." / "Host is a critical payment server." |
| 4. Classify | TP / FP / Requires further investigation | "This is a confirmed true positive." / "Closing as FP — scheduled scan." |
| 5. Act | Open incident or close with documented reason | "Escalating to Tier 2." / "Closed — false positive, originating from Nessus scan." |
| 6. Document | Write case notes; log rationale for all decisions | "Investigation steps taken: …" / "Recommended rule change: …" |
Alert queue management vocabulary:
• Alert queue — the list of firing alerts awaiting analyst review; managed by priority/severity and age
• Queue depth — the number of unreviewed alerts; high queue depth = SOC under stress or rule quality issues
• Alert SLA — the time target for initial triage: e.g. "P1 alerts triaged within 15 minutes of firing"
• Alert ownership — assigning an alert to a specific analyst to ensure no alert is dropped or duplicated
Key vocabulary:
• Alert triage — the structured process of evaluating an alert's validity and required action: acknowledge → assess → enrich → classify → act → document
• Triage (noun, verb) — from medical triage; in SOC = prioritising and routing security events based on severity and context
• Alert fatigue — chronic analyst exhaustion caused by excessive FP alerts; leads to desensitisation and missed real threats
Next up: Threat Hunting →