跳至正文

Incident Management

此内容尚未提供中文翻译。

Incident Management provides full lifecycle tracking for security incidents — from automatic creation through investigation, escalation, and resolution. Incidents are created automatically from detection rules or manually by analysts.


How Incidents Are Created

Automatic (Detection Engine)

When a critical or high severity detection rule matches events, an incident is automatically created:

Detection Rule (high/critical) → Alert Created → Incident Auto-Created
  • Deduplication: 1 incident per rule per 24 hours (no duplicates for different target IPs)
  • Title format: [Auto] Rule Name (e.g., [Auto] TCP SYN Scan Detection)
  • Includes: Rule name, match count, target, MITRE tactic/technique, query

Manual Escalation

Click Escalate on any alert detail page to create an incident from that alert:

  • Title format: Escalated: Alert Title
  • Links: Original alert automatically linked to the incident

Manual Creation

Create incidents directly from the Incidents page for ad-hoc security events.


Incident Lifecycle (NIST)

Follows the NIST Computer Security Incident Handling lifecycle:

StatusDescription
OpenNewly created, awaiting triage
ContainedThreat contained, preventing further spread
EradicatedRoot cause removed from environment
RecoveredSystems restored to normal operation
ClosedFully resolved and documented

Views

Table View

Sortable table with columns:

  • Incident ID, Severity, Title, Status, Assigned To, Alert Count, SLA, Created

Kanban Board

Visual workflow board with 5 NIST status columns. Drag and drop incidents between columns to update status in real-time.


KPI Dashboard

MetricDescription
Open IncidentsCurrently active incidents
MTTRMean Time to Resolve (calculated from real data)
SLA Compliance% of closed incidents resolved within deadline (real calculation from sla_resolution_deadline vs closed_at)
New TodayIncidents opened today

Incident Detail

Each incident detail page includes:

Summary

  • Title, description, severity, status (dropdown to change)
  • Assigned analyst, SLA deadline
  • Executive summary (auto-generated for detection-created incidents)

Linked Alerts

Alerts correlated to this incident. For auto-created incidents, the triggering detection alert is automatically linked.

Timeline

Chronological activity log: status changes, assignments, comments, linked alerts.

Tasks

Investigation and remediation checklist with completion tracking.

Comments

Analyst notes and investigation findings with user attribution.

AI Analysis (KYRA tab)

AI-powered security analysis with:

  • Dual Agent assessment (Global Threat Intel + Internal SOC)
  • Quick action buttons for investigation, threat analysis, compliance check
  • Chat-based interaction with KYRA AI Security Analyst

Auto-Incident Pipeline

OpenSearch Events Detection Engine Alert Incident
───────────────── ──────────────── ───────── ──────────
events-* (syslog) ──→ 153 rules/60s ────→ [Detection] rule ──→ [Auto] rule
network-logs-* ─────→ Adaptive skip ────→ AI Assessment ─────→ (high/critical only)
match_none guard Dual Agent 1 per rule/24h

Example Flow

  1. Detection rule “TCP SYN Scan Detection” (tcp_flags=2 payload_len=0 source=ndr) matches 18,000+ network flows
  2. Alert created: [Detection] TCP SYN Scan Detection → 34.149.66.137
  3. Severity is high → Incident auto-created: [Auto] TCP SYN Scan Detection
  4. AI agents assess both the alert and the detection rule
  5. Incident appears in Kanban board under Open column
  6. Analyst drags to Contained after blocking the scanning IP

SLA Targets

SeverityResponse TimeResolution Time
Critical15 min4 hours
High30 min8 hours
Medium2 hours24 hours
Low4 hours72 hours

SLA compliance is calculated from real data: closed_at vs sla_resolution_deadline.


Access Requirements

Incident Management requires the Respond (MDR) tier or above.