LOW (P4)
Target response: 1–3 business days
- How-to, minor changes, routine access requests (non-urgent)
- Cosmetic issues, non-blocking questions, scheduling
Action: Ticket + schedule follow-up. Provide self-service instructions where available.
MEDIUM (P3)
Target response: next 1–2 days
- Single user / small group impacted, workaround exists
- Single phishing email report with no click / no creds entered (still route to security)
- Device lost but encrypted + remote lock/wipe available (route to security; severity per policy)
Action: Ticket with clear repro steps + correct assignment. Set “next update” expectation (within 1–2 days).
HIGH (P2)
Target response: within 24 hours
- Major degradation affecting many users (not total outage)
- Confirmed phishing campaign impacting multiple users (even if no compromise confirmed yet)
- VIP/Executive cannot work (email/SSO/laptop lockout)
- Malware suspected on one device but contained/isolated (not spreading)
Action: Create P2 ticket, notify team lead + security queue if applicable. Update caller at least daily (or sooner as needed).
CRITICAL (P1)
Target response: same day
- Suspected breach / active compromise: ransomware, critical EDR alert, unknown admin accounts, mailbox takeover signs
- MFA push spam / impossible travel / user reports “I didn’t do that login”
- Data exposure: lost/stolen device with sensitive data, public file share exposure, credentials leaked
- Org-wide outage: SSO/Entra/Okta down, email down, VPN down for most users, core internet/site down, phone system down
- Core infrastructure failure: DNS/DHCP/Domain Controller issues affecting authentication broadly
Action: Open P1 ticket + start incident timeline. Notify Security On-Call + Helpdesk/NOC On-Call.
Preserve evidence (screenshots, headers, alert text). Set update cadence (same-day updates per incident lead).