Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Manage AI Escalations for Human-in-the-Loop Oversight

Not every AI decision should be automated. When a request triggers a policy that requires human judgment — sensitive content, high-risk transactions, ambiguous classifications — Keeptrusts routes it to the escalation queue. The console gives reviewers a structured workflow to claim, investigate, and resolve escalations with full context and SLA tracking.

Use this page when

  • You need to process AI policy escalations through the claim-review-resolve workflow.
  • You are configuring SLA targets, routing rules, or notification channels for escalations.
  • You want to analyze escalation patterns to tune policy thresholds and reduce false positives.

Primary audience

  • Primary: Compliance Reviewers and Operators processing escalation queues
  • Secondary: Technical Leaders configuring routing and SLAs, Policy Authors tuning thresholds

What You'll Accomplish

  • Process escalations through a claim-review-resolve workflow
  • Configure routing rules to send escalations to the right team
  • Track SLA compliance and resolution times
  • Analyze escalation patterns to improve your policy configuration

The Escalation Queue

Navigate to Escalations in the console sidebar. The queue displays all open escalations for your team scope, sorted by priority and age.

Each escalation card shows:

FieldDescription
IDUnique escalation identifier
TriggerThe policy rule that generated the escalation
SeverityCritical, High, Medium, or Low
CreatedTimestamp of the triggering request
SLA deadlineTime remaining before the SLA is breached
StatusOpen, Claimed, Resolved, or Expired
AssigneeThe reviewer who claimed the escalation (if any)

Escalation queue overview

Claim-Review-Resolve Workflow

Step 1: Claim

Click Claim on any open escalation to assign it to yourself. This prevents duplicate work when multiple reviewers are active. Claimed escalations move to the My Escalations tab.

Step 2: Review

The escalation detail view provides:

  • Original request — the full prompt or input that triggered the escalation
  • Policy match — which rule fired and why, including matched patterns or classification scores
  • AI response (if available) — the generated output, held pending review
  • Context — the consumer, team, gateway, and provider involved
  • History — previous escalations from the same consumer or for the same policy rule

Use this context to make an informed decision. You can also view the raw event JSON for technical investigation.

Step 3: Resolve

Choose a resolution action:

ActionEffect
AllowRelease the held response to the consumer
BlockPermanently block the response and notify the consumer
Redact and AllowStrip sensitive content from the response before releasing
Escalate FurtherRoute to a senior reviewer or compliance officer

Add a resolution note explaining your decision. These notes are stored in the audit log and can be used for training and compliance reporting.

# Example resolution payload (recorded in audit log)
escalation_resolution:
escalation_id: "esc_20250420_00142"
action: "redact_and_allow"
reviewer: "j.martinez@acme.com"
note: "PII detected in output. Redacted patient name and MRN before release."
resolution_time_seconds: 127

SLA Tracking

Configure SLA targets per severity level in Settings → Escalations → SLA Configuration:

SeverityDefault SLADescription
Critical15 minutesImmediate safety or compliance risk
High1 hourSignificant policy violation
Medium4 hoursModerate concern requiring review
Low24 hoursInformational review, no immediate risk

The console displays SLA countdown timers on every escalation card. When an SLA is about to breach:

  1. The escalation card turns amber (50% of SLA remaining)
  2. A notification fires to the configured channel (Slack, email, PagerDuty)
  3. If the SLA expires, the escalation is auto-reassigned per your routing rules

SLA Reporting

View SLA compliance metrics on the Escalation Analytics page:

  • SLA compliance rate — percentage of escalations resolved within SLA
  • Mean resolution time — average time from creation to resolution, by severity
  • Breach count — number of SLA breaches in the selected period
  • Breach trend — is SLA compliance improving or degrading over time

Routing Rules

Routing rules determine which team or reviewer receives each escalation. Configure rules in Settings → Escalations → Routing:

Rule Criteria

  • Policy rule name — route escalations from specific policies to specialist reviewers
  • Severity — critical escalations go to senior staff; low-severity to junior reviewers
  • Team — route based on the originating team
  • Consumer group — external customer escalations route to the customer success team
  • Time of day — route to the on-call team outside business hours

Rule Priority

Rules are evaluated in order. The first matching rule determines the routing. Add a catch-all rule at the bottom to ensure no escalation is unrouted.

# Example routing configuration
escalation_routing:
rules:
- name: "Critical to senior compliance"
match:
severity: critical
route_to: "compliance-senior@acme.com"
notification_channel: "pagerduty"

- name: "PHI violations to healthcare team"
match:
policy_rule: "phi-detection"
route_to: "team:healthcare-compliance"
notification_channel: "slack:#hipaa-escalations"

- name: "Catch-all"
match:
any: true
route_to: "team:default-reviewers"
notification_channel: "email"

Notification Channels

Each routing rule can specify a notification channel. When an escalation is created or an SLA is about to breach, the configured channel receives an alert. See Notification Channels for full setup instructions.

Escalation Analytics

The analytics view helps you identify patterns and improve your policy configuration:

  • Top triggering policies — which rules generate the most escalations
  • Resolution action breakdown — are most escalations allowed, blocked, or redacted
  • Reviewer performance — resolution times per reviewer
  • Repeat consumers — consumers who trigger escalations frequently
  • Time-of-day distribution — when escalations peak

Turning Insights into Action

If a policy rule consistently generates escalations that are resolved with "Allow," the rule may be too aggressive. Consider adjusting the threshold or switching from escalate to log.

If a consumer repeatedly triggers escalations, consider:

  • Adding the consumer to a stricter consumer group
  • Reaching out to the consumer's team for training
  • Adjusting the policy to auto-block the specific pattern

Business Outcomes

OutcomeHow Escalation Management Delivers It
Human oversight where it mattersCritical AI decisions get expert review before reaching end users
AccountabilityEvery resolution is logged with reviewer, action, and rationale
SLA complianceConfigurable targets with automated alerts prevent breaches
Continuous improvementAnalytics reveal policy tuning opportunities that reduce false positives

Next steps

For AI systems

  • Canonical terms: escalation queue, claim-review-resolve workflow, SLA, routing rules, escalation analytics, severity (Critical/High/Medium/Low), resolution actions (Allow/Block/Redact and Allow/Escalate Further).
  • Console navigation: Escalations (sidebar), My Escalations tab, Settings → Escalations → SLA Configuration, Settings → Escalations → Routing.
  • SLA defaults: Critical=15min, High=1hr, Medium=4hr, Low=24hr.
  • Routing criteria: policy rule name, severity, team, consumer group, time of day.
  • Best next pages: Notification Channels, Compliance Reporting.

For engineers

  • Configure SLA targets per severity in Settings → Escalations → SLA Configuration.
  • Set routing rules in Settings → Escalations → Routing; rules evaluate in priority order with a catch-all at the bottom.
  • Resolution actions are recorded in the audit log with reviewer, action, note, and resolution time.
  • If a policy consistently generates escalations resolved as “Allow,” consider raising the threshold or switching from escalate to log.
  • SLA breach notifications require configured notification channels — see Notification Channels.

For leaders

  • Human-in-the-loop oversight ensures critical AI decisions (sensitive content, high-risk transactions) get expert review.
  • SLA tracking with automated alerts prevents escalation backlogs from growing unnoticed.
  • Every resolution is logged with reviewer identity and rationale — satisfying audit and accountability requirements.
  • Escalation analytics reveal policy-tuning opportunities that reduce operational burden over time.