Cyber Security Incident Response Template
Cyber Security Incident Response Template
This incident response plan template has been derived from the public domain information of
the SANS Institute cybersecurity sample policies and other public sources. It is available for
usage, alteration, and reformatting according to the specific needs of your organization.
2. Help <COMPANY NAME> personnel recover their business processes after a computer or
network security incident or other type of data breach.
3. Provide a consistent response strategy to system and network threats that put <COMPANY
NAME> data and systems at risk.
4. Develop and activate a communications plan including initial reporting of the incident as well as
ongoing communications, as necessary.
6. Coordinate efforts with external Computer Incident Response Teams and law enforcement.
significant role in the technical details that may be involved in an incident detection and response and
can be considered an SME in that regard.
There shall be a member of the IRT designated as the Incident Response Manager (IRM), who will take
on organizational and coordination roles of the IRT during an incident where the IRT is activated for
response to the incident.
Cyber incident response management is an on-going process with a cyclical pattern. The specific
incident response process elements that comprise the Cyber Incident Response Plan include:
1. Preparation: The on-going process of maintaining and improving incident response capabilities
and preventing incidents by ensuring that systems, networks, applications, and data handling
processes are sufficiently secure, and employee awareness training is in place. Practice
exercises (aka Table-top Exercises) for the IRT are conducted periodically, where various
incident scenarios are presented to the Team in a practice session.
6. Recovery: Restoring computing services to a normal state of operation and the resumption of
business activities quickly and securely. Provide reputational repair measures and news media
updates, if needed. Provide credit monitoring services to effected constituents, or other
remediation measures, as appropriate.
These process elements are depicted in Figure 1, showing the closed loop nature of the process, in
that the learnings from any prior incidents are used to improve the prevention and response process of
potential future incidents.
Post-Incident Identification
Recovery Notification
Eradication Containment
Figure 1
Incident Occurrence & Awareness
The way an incident becomes know will have an impact on the response process and its urgency.
Examples by which <COMPANY NAME> becomes aware of an incident include, but are not limited to
the following:
1. <COMPANY NAME> discovers through its internal monitoring that a cyber incident or data
breach has occurred.
Process
Phase
& Process Detail Steps Involved Parties
Approximate
Timing
1. Identify and confirm that the suspected or reported
incident has happened and whether malicious activity is
Identification IT and any
still underway.
monitoring
2. Determine the type, impact, and severity of the incident
(Hours) service provider
by referring to Appendices B, C, and D.
3. Take basic and prudent containment steps.
4. Inform or activate the IRT, based on the severity of the
incident, as outlined in Appendix D, and provide the type,
Notification impact, and details of the incident to the extent that they
are known. IT & IRT
(Hours – 1
5. Determine the need for Subject Matter Experts (SME) to
Day)
be involved in the Containment, Eradication, and
Recovery processes.
6. Take immediate steps to curtail any on-going malicious
Containment
activity or prevent repetition of past malicious activity.
IRT, IT, SME’s
7. Re-direct public facing websites, if needed. Provide
(Hours-2 Days)
initial public relations and legal responses as required.
8. Provide full technical resolution of threat and related
Eradication
malicious activity. IT, IRT, SME’s
(Days -Weeks)
9. Address public relations, notification, and legal issues.
10. Recover any business process disruptions and re-gain
Recovery normal operations.
SME’s, IRT
11. Address longer term public relations or legal issues, if
(Weeks -Months)
required, and apply any constituent remedies.
12. Formalize documentation of incident and summarize
Post-incident
learnings. IRT
(Months)
13. Apply learnings to future preparedness.
Communication Methods
Company communication resources (email, phone system, etc.) may be compromised during a
severe incident. Primary and alternate methods of communication using external infrastructure
will be established and noted on the IRT member contact list to provide specific methods of
communication during an incident. The IRT and any other individuals involved in an incident
resolution will be directed as to which communication method will be used during the incident
Information Recording
Information recording is very important during an incident, not only for effective containment and
eradication efforts, but also for post-incident lessons learned, as well as any legal action that may
ensue against the perpetrators. Each member of the IRT shall be responsible for recording information
and chronological references about their actions and findings during an incident, using the IRT Incident
Record Form in Appendix E.
Summary
No perfect script can be written for the detailed activity encountered and decisions that will need to be
made during an incident, as each incident will have its own uniqueness. This plan shall serve as a
framework for managing cyber security and data breach incidents, allowing the details of confirmation,
containment, eradication, and communication to be tailored to fit the specific situation.
Team Members and Roles - Substitute staff names and titles below as appropriate. Not all the positions may be
available in your organization and/or the same person may have multiple roles within the IRT.
Primary Team Members
9. <Legal representative>
a. Legal advisor
b. Contractual matters
Contact information and communication methods for the IRT members should be distributed to the team separately as
confidential information.
DDoS attack against An enterprise-wide attack IRT and the IRM direct
on-premise or hosted involving multiple response. Remediation
as needed.
Incident: _________________________________________________________________
Discovery Date: ______________
Recorded By: ___________________________________ Page ______ of ______ Pages