Skip to main content

Incident Response Workflows

Streamline your security incident response with automated workflows and standardized procedures.

Automation

Incident workflows automate routine tasks and ensure consistent, documented responses to security threats.


What Are Incident Workflows?

Incident workflows are automated, repeatable processes that guide your security team through incident response from detection to resolution.

FeatureDescription
Automated TriageAI-powered prioritization and assignment
Standardized PlaybooksPre-built response procedures
Approval WorkflowsMulti-stage approval for critical actions
DocumentationAutomatic audit trail and reporting

Standard Incident Lifecycle

Stage 1: Detection

Threat detected by detection rules, AI analysis, or manual reporting.

Automated Actions:

ActionDescription
Create incident recordNew incident in system
Assign severity scoreAI-calculated priority
Notify on-call teamAlert responsible personnel
Generate initial timelineCapture event sequence

Automation Capabilities

Automatic Escalation

Incidents are automatically escalated based on:

TriggerAction
Time without responseSLA-based escalation
Severity increaseDuring investigation
Additional affected systemsScope expansion
Failed containmentRequires senior attention

Creating Custom Workflows

Navigate to SettingsIncident ManagementWorkflows:

StepDescription
1. Define TriggersSpecify when workflow activates (severity, event type, tags)
2. Configure StagesAdd, remove, or modify workflow stages
3. Set AutomationDefine automatic actions, approvals, escalations
4. Test and DeployValidate logic before production use

SLA Management

Set and track Service Level Agreements for incident response:

SeverityInitial ResponseResolution Time
CriticalUnder 15 minutesUnder 4 hours
HighUnder 1 hourUnder 24 hours
MediumUnder 4 hoursUnder 3 days
LowUnder 24 hoursUnder 7 days
SLA Configuration

SLAs can be customized in SettingsIncident ManagementSLA Configuration.

📊 SLA Breach Handling

When an SLA is breached:

  1. Automatic notification sent to management
  2. Incident flagged with SLA breach indicator
  3. Escalation triggered to next level
  4. Breach recorded for reporting and improvement

Pre-Built Playbooks

CastellanAI includes playbooks for common incident types:

PlaybookTriggerKey Actions
Ransomware ResponseRansomware detectionIsolate, preserve evidence, escalate
Brute Force AttackMultiple auth failuresBlock IP, reset credentials, investigate
Data ExfiltrationLarge outbound transferBlock destination, isolate source, audit
Malware DetectionMalware signature matchQuarantine, scan related systems
Insider ThreatAnomalous user behaviorPreserve logs, disable account, investigate

What's Next?

GuideDescription
Custom Detection RulesCreate rules to trigger workflows
Threat RemediationLearn remediation procedures
Generating ReportsCreate incident reports
Taking ActionExecute response actions
Need Help?

Our team can help design workflows tailored to your organization. Contact Support