Skip to main content
Back to Help Center
PLANNING GUIDE

Compliance Alerting Playbook

Current launch uses dashboard review and operator-managed escalation. Notification channels remain post-certification roadmap items.

Dashboard MonitoringOperator EscalationSeverity RoutingFuture Integrations

Why Alerting Discipline Matters for CCO/CPO

72-Hour GDPR Deadline

Data breaches require notification to authorities within 72 hours. Operator-owned alerting discipline keeps that deadline visible.

Control Test Failures

Control failures need fast escalation and documented follow-up before auditors find them.

Unusual Activity

Detect abnormal file processing patterns that may indicate insider threats or compromised accounts.

4 Alert Types to Operationalize

High-Risk File Processing

high_risk_files
CRITICAL

Triggers when files with GPS location data, personal identifiers, or critical-risk metadata are processed

Example: JPEG with GPS coordinates detected - potential location exposure

Unusual Processing Activity

unusual_activity
HIGH

Triggers when processing volume exceeds 5x normal hourly average (minimum 50 files)

Example: User processed 500 files in 1 hour (normal: 50/hour)

Compliance Policy Violation

compliance_breach
HIGH

Triggers when data handling policies are violated or retention limits exceeded

Example: Data retention policy exceeded for customer records

Usage Quota Exceeded

quota_exceeded
MEDIUM

Triggers when plan usage limits are exceeded

Example: Monthly file processing quota reached (5000/5000)

Planning Slack Notifications After Certification

1

Create Slack Webhook

  1. Go to api.slack.com/apps
  2. Click "Create New App" → "From scratch"
  3. Name it "Compliance Alerts" and select your workspace
  4. Under "Features" → "Incoming Webhooks" → Enable
  5. Click "Add New Webhook to Workspace"
  6. Select the channel (e.g., #compliance-alerts)
  7. Copy the Webhook URL
2

Map the Future Integration

  1. Define the Slack channel ownership and escalation policy
  2. Document the webhook destination and retention expectations
  3. Map which event classes will be eligible for push notification
  4. Keep the current launch workflow in the dashboard until notification rollout is certified
  5. Test the runbook with manual drills
  6. Approve the integration during a later release window
3

Create an Operator Escalation Rule

  1. Go to Compliance → Alerts
  2. Create the rule with severity and owner
  3. Document the manual escalation path for each severity
  4. Record backup contacts in the runbook
  5. Set review cadence and cooldown expectations
  6. Save the rule and rehearse it in tabletop review

Pro Tip: Channel Strategy

Create separate escalation paths for different severities and validate who responds at each stage before enabling push notifications later.

Planning Email Notifications After Certification

When Defining an Alert Runbook:

  1. List the recipients who own each alert severity
  2. Document the escalation order and fallback approver
  3. Capture the exact alert fields that must appear in the future email template
  4. Keep the current launch workflow inside the dashboard and evidence log

Best Practice: Escalation Chain

For CRITICAL alerts, define multiple recipients in order of escalation:analyst@company.com, cpo@company.com, ceo@company.com

Severity-Based Routing Guide

SeverityResponse TimeRecommended ChannelsCooldown
CRITICAL< 15 minutesDashboard + operator call tree5 minutes
HIGH< 1 hourDashboard + assigned owner15 minutes
MEDIUM< 4 hoursDashboard review60 minutes
LOWNext business dayDashboard only240 minutes

Troubleshooting Common Issues

Slack notifications not arriving

  • Confirm the alert rule has an assigned owner
  • Check the escalation runbook is current
  • Verify the issue appears in the dashboard
  • Document the manual follow-up in the evidence log

Too many alerts (alert fatigue)

  • Increase cooldown period (recommended: 60+ minutes for non-critical)
  • Adjust trigger conditions to be more specific
  • Use severity-based routing to reduce noise
  • Consider dashboard-only for LOW severity

Alerts not triggering when expected

  • Verify alert rule is active (isActive: true)
  • Check if cooldown period has passed since last trigger
  • Review trigger conditions match the event
  • Confirm the assigned owner reviewed the dashboard state

Email notifications in spam

  • Confirm the notification channel is still roadmap-only in the current launch
  • Use the dashboard and evidence ledger as the source of truth
  • Update the runbook before enabling email later
  • Verify contact information is current for manual escalation