A Response is how the Secure60 platform connects to external systems and sources.
Responses can be as simple as an email or could be an HTTP request to an API endpoint to trigger a specific action.
A Response is an Object in the Secure60 platform that is triggered by a Rule
There are 2 main types of Response action within Secure60
A response by default has a scope which indicates whether the Response should fire on a matching Rule.
The scope can be All, SIGNAL or THREAT.
This allows for Responses to only be executed for Theats for example.
A response has a severity (default INFO) which indicates whether the Response should fire based on the Severity level of a Threat.
severity valid values are: INFO, LOW, MEDIUM, HIGH.
This allows for Responses to only be executed for Theats of a specific level of importance / risk for example. This allows different teams or workflows to handle Threats of varying criticality.
Organisations often need to be more specific about how and when a response should be executed, Common scenarios include:
Response Overrides offer a solution to all of these scenarios and more.
Once a Response has been created you may add Overrides to fine tune the execution scenarios
Within the content of every Response we allow templating. This enables the insertion of dynamic content into the Response data that is sent.
Scenarios where this is useful include:
Within response fields we support a templating system that gives access to the data related to the rule, signal or threat that generated the response.
Key syntax details:
subject (email Response Type)content (email Response Type)uri (webhook Response Type)request_payload (webhook Response Type)rule_idnamegroup_idstatusproject_idorganisation_idthreat_idsignal_idAn email Response operation has a Send Mode that decides how matching threats are delivered to recipients.
Each matching threat produces one email per recipient immediately — this is the original Response behaviour, suitable for low-volume high-priority alerting (a single critical rule, a specific IoC list, etc.).
{{threat_id}}, {{name}}, etc.) apply.Use real-time when you want every matching threat to generate its own email — for example a named “CRITICAL vuln watch” response that pages an on-call email alias.
Matching threats are queued and delivered as a single grouped email per recipient on a schedule.
This is the right default for most Responses — particularly anything that can match tens or hundreds of threats in a short time window (vulnerability scanner output, bulk IoC matches, noisy rule groups). Without digest mode, a single vulnerability scan across a new host can fire thousands of emails to the same recipient.
Controls available in Digest mode
HOURLY, DAILY (default), or WEEKLY.NONE (nothing bypasses). Options: NONE, LOW, MEDIUM, HIGH.In digest mode the Subject, Body, and Content Type fields are hidden. The subject and body are auto-generated from the Response name and the list of findings. If you flip back to Real-time later the stored template values are restored — your customisations aren’t lost.
What the digest email looks like
The response-digest cron runs every hour on the hour (UTC). For each queued (response, recipient) pair, the cron decides whether to fire based on the configured cadence and the recipient’s Time Zone (set on the User record — see User Management):
If a recipient’s email address doesn’t map to a User record, or the User has no Time Zone set, scheduling falls back to UTC. See User Management → Digest Emails and Timezones for the full model.
| Goal | Use |
|---|---|
| Alert one or two on-call emails about every critical detection | Real-time, optionally filter severity down to HIGH on the Response itself |
| Notify a team about bulk vulnerability/threat-intel findings without flooding them | Digest, DAILY, bypass NONE |
| Same as above but escalate HIGH severity immediately | Digest, DAILY, bypass HIGH |
| Time-sensitive review cadence (e.g. every hour during an incident) | Digest, HOURLY |
| Weekly summary for a stakeholder who doesn’t triage day-to-day | Digest, WEEKLY |