INTERMEDIATE // REAL TIME RESPONSE
MODULE 03 // ACTION MAPPING

Decision Routing.

Transform ABIS assessments into application actions. Build decision trees that route users through appropriate flows based on behavioral risk profiles.

DECISION TREE DESIGN

Decision routing transforms risk assessments into concrete actions: approve, deny, challenge, review, or escalate. The routing logic should be externalized from application code, enabling rapid policy updates without deployments.

Consider implementing decision trees as configuration rather than code. This allows security teams to adjust routing logic based on emerging threats without requiring engineering involvement for every change.

Always include an audit trail. Every decision should log: input risk score, decision path taken, final action, and timestamp. This enables post-incident analysis and regulatory compliance.

APPROVE PATH

Low-risk transactions proceed immediately. No user friction, standard processing flow.

CHALLENGE PATH

Medium-risk triggers step-up authentication: SMS code, email verification, or security questions.

REVIEW PATH

Suspicious patterns queue for human review. Transaction held pending analyst decision.

DENY PATH

High-risk blocked immediately. User notified with appeal instructions if legitimate.

KNOWLEDGE CHECK // Q03
Why should decision routing logic be externalized from application code?