Incident Escalation Matrix

Operations & Procedures Risk Management Last reviewed: 2025-11-05 Owner: Risk Management

Purpose

This document defines the Bank's incident escalation matrix, ensuring that operational incidents are escalated to the appropriate level of management in a timely and structured manner. Proper escalation enables rapid decision-making, minimises client and business impact, and ensures regulatory notification obligations are met.

Scope

This matrix applies to all operational incidents across the Bank, including technology failures, payment processing disruptions, security breaches, fraud events, compliance breaches, physical security incidents, and client-impacting service disruptions.

Severity Classification

SeverityDefinitionExamples
S1 — CriticalWidespread impact on clients or operations; core systems unavailable; significant financial or reputational exposureCore Banking System outage, data breach affecting client data, SWIFT connectivity failure, major fraud event (>USD 1M)
S2 — MajorSignificant impact on a business line or client segment; partial system failure; material financial exposurePayment processing delays affecting multiple clients, branch network outage, failed bulk payment batch (>USD 500K), compliance breach requiring regulatory notification
S3 — ModerateLimited impact on operations or clients; system degradation with workaround available; manageable financial exposureSingle branch system failure, individual payment failure (>USD 50K), minor compliance exception, client complaint involving potential financial loss
S4 — MinorMinimal impact; isolated event; no material financial or reputational exposureIndividual user access issue, minor process error, delayed report generation

Escalation Matrix

S1 — Critical Incidents

TimelineActionResponsible Party
Immediately (T+0)Incident detected and logged in Incident Management System (IMS)Detecting staff / system alert
Within 15 minutesNotify line manager and Incident Commander (on-call)Detecting staff
Within 30 minutesActivate Crisis Management Team (CMT); notify Head of Operations, CRO, CIOIncident Commander
Within 1 hourNotify CEO, General Counsel, Head of CommunicationsIncident Commander / CMT
Within 2 hoursAssess regulatory notification requirements; prepare initial communication to regulator if requiredCompliance / Legal
Within 4 hoursIssue internal situation report to Executive Committee; prepare client communication (if applicable)CMT / Communications
OngoingHourly status updates to CMT until resolutionIncident Commander

S2 — Major Incidents

TimelineActionResponsible Party
ImmediatelyIncident logged in IMSDetecting staff
Within 30 minutesNotify line manager and department headDetecting staff
Within 1 hourNotify Head of Operations and CRODepartment head
Within 2 hoursAssess regulatory notification requirementsCompliance
Within 4 hoursIssue situation report to COODepartment head
OngoingStatus updates every 2 hours until resolutionAssigned incident manager

S3 — Moderate Incidents

TimelineActionResponsible Party
ImmediatelyIncident logged in IMSDetecting staff
Within 1 hourNotify line managerDetecting staff
Within 4 hoursNotify department head (if not resolved)Line manager
Within 1 business dayResolution or escalation to S2 if impact increasesLine manager

S4 — Minor Incidents

TimelineActionResponsible Party
ImmediatelyIncident logged in IMSDetecting staff
Within 4 hoursNotify line managerDetecting staff
Within 3 business daysResolution and closure in IMSLine manager

Crisis Management Team (CMT)

The CMT is convened for all S1 incidents and S2 incidents at the discretion of the Head of Operations. The standing members of the CMT are:

  • Chief Operating Officer (Chair)
  • Chief Risk Officer
  • Chief Information Officer
  • Head of Operations
  • Head of Compliance
  • General Counsel
  • Head of Corporate Communications

Additional members are co-opted based on the nature of the incident (e.g., Head of Payments for payment-related incidents, CISO for cybersecurity incidents).

Post-Incident Review

  1. All S1 and S2 incidents require a formal Post-Incident Review (PIR), to be completed within ten (10) business days of incident resolution.
  2. The PIR includes root cause analysis, timeline of events, effectiveness of the response, and recommendations for improvement.
  3. PIR findings are presented to the Operational Risk Committee and relevant remedial actions are tracked to completion.

Related Documents

  • Operational Risk Reporting
  • Business Continuity Plan Overview
  • Disaster Recovery Procedures
  • Technology Incident Management Policy