Confirmed or highly suspected breach of confidentiality, integrity, or availability with significant impact
Confirmed credential compromise; confirmed exfiltration of user data; complete service outage affecting all MCPs; audit log tampering detected
High
Strong indicators of a security incident; impact not yet confirmed
Sustained anomalous API access pattern; OBO auth failures spike beyond normal; unexpected SSM parameter access in CloudTrail; unknown principal assuming IAM role
Medium
Isolated anomaly or policy violation without confirmed breach
Single-user auth failure spike; unexpected 4xx/5xx rate on one MCP; failed intrusion attempt (blocked by security groups or IAM); Snyk finding in a deployed image
Low
Informational event warranting investigation but unlikely to indicate active threat
Four CloudWatch alarms are provisioned per MCP and publish to the aiconnectors-alarms-{env} SNS topic (email to AI connectors team). See logging-monitoring.md §7 for alarm definitions and thresholds. Potential incident indicators:
Immediately disable the secret in Azure AD (portal — no ServiceNow required); run terragrunt apply in infra/initial/mcps/{name}/ to generate a new secret and update SSM; force ECS redeployment
Compromised user account
Coordinate with NN IT to disable the user's Azure AD account; this immediately invalidates all their active tokens (including any cached OBO tokens which expire naturally within ~1 hour)
Unauthorized IAM role use
Revoke the role's trust policy or session credentials via AWS IAM; investigate CloudTrail for scope
Suspected data exfiltration via MCP tool
Block the specific user's Azure AD account; review audit logs for all their recent tool calls; check the downstream data sources for any downstream effects
Audit log tampering attempt
S3 bucket policy denies DeleteObject for all principals — confirm via CloudTrail that no records were deleted; if the bucket policy itself was modified, treat as Critical
Service outage (suspected attack)
Scale ECS service to 0 tasks to stop serving traffic while investigating; restore once root cause is confirmed
Before taking any remediation action, preserve all relevant evidence. The AI connectors platform's immutable audit trail provides a strong evidentiary baseline.
Do not force-redeploy ECS tasks until CloudWatch logs for the current task have been exported — container replacement destroys the running instance's in-memory state and may overwrite the log buffer
Do not modify SSM parameters until the compromised parameter value is documented (for forensic comparison)
Do not delete CloudTrail events or CloudWatch log streams — ECS task roles do not have this permission anyway, but operators should avoid it during an investigation
Label preserved evidence with the incident date, description, and the name of the person who exported it
A post-incident review must be completed within 5 business days of a Medium or higher severity incident. The review output is recorded below and stored in docs/compliance/incident-reviews/.