| Severity | Typical indicators | Response posture | SLA |
|---|---|---|---|
| Critical | Confirmed ransomware, regulated data exfiltration, full system compromise | Immediate all-hands; executive sponsor activated | Within 15 min |
| High | Confirmed account compromise, active lateral movement, customer-impacting outage | IC + technical lead activated | Within 30 min |
| Medium | Malware on isolated endpoint, phishing with credential submission, suspicious privilege escalation | Technical lead leads; IC on standby | Within 2 hours |
| Low | Policy violation, isolated spam/phishing with no click, failed brute-force | Standard ticket workflow | Next business day |
| Timestamp (UTC) | Action / decision taken | Owner |
|---|---|---|
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
| YYYY-MM-DD HH:MM | Description | Name |
Complete before an incident occurs. Review and test quarterly. Every role must have a named backup.
| Role | Assigned to | Backup | Contact (out-of-hours) | Key authority |
|---|---|---|---|---|
| Incident Commander | Name | Name | Phone / Slack | Declare severity, authorize containment, own comms cadence |
| Technical Lead | Name | Name | Phone / Slack | Direct investigation and containment actions |
| Communications Lead | Name | Name | Phone / Slack | Approve all external/customer messaging |
| Legal / Compliance Lead | Name | Name | Phone / Slack | Trigger regulatory notifications, approve legal statements |
| Executive Sponsor | Name | Name | Phone / Slack | Authorize business continuity mode, approve major spend |
| Business Continuity Lead | Name | Name | Phone / Slack | Activate continuity tiers, track critical service status |
| Contact type | Organization / name | 24/7 phone | Notes / account ref |
|---|---|---|---|
| Cyber insurer (24/7 claims hotline) | Name | Number | Notes |
| External IR / forensics retainer | Name | Number | Notes |
| Legal counsel (data breach) | Name | Number | Notes |
| Managed security provider (MDR/SOC) | Name | Number | Notes |
| Critical vendor security contact | Name | Number | Notes |
| Law enforcement liaison (if needed) | Name | Number | Notes |
| Window | Action set | Owner | Done (HH:MM) |
|---|---|---|---|
| 0–15 min | Declare, assign roles, evidence snapshot, initial containment, open incident log | Incident Commander | HH:MM |
| 15–30 min | Confirm containment effectiveness; identify initial attack vector; notify exec sponsor (Crit/High); trigger legal/compliance if regulated data involved | IC + Technical Lead | HH:MM |
| 30–45 min | Expand investigation scope; validate no secondary compromise paths; send first stakeholder update | Technical Lead + Comms Lead | HH:MM |
| 45–60 min | Assess business continuity impact; activate continuity mode if critical services affected; confirm evidence preservation complete | IC + BC Lead | HH:MM |
⚠ 2026: Treat any voice memo, phone call, or video request to approve a payment as potentially deepfake-generated. Verify through a separate, pre-established channel before acting.
| Artifact ID | Description | Source system | Collected by | Timestamp (UTC) | Storage location | Hash (SHA-256) |
|---|---|---|---|---|---|---|
| EVD-001 | Description | System | Name | YYYY-MM-DD HH:MM | Path / bucket | Hash |
| EVD-002 | Description | System | Name | YYYY-MM-DD HH:MM | Path / bucket | Hash |
| EVD-003 | Description | System | Name | YYYY-MM-DD HH:MM | Path / bucket | Hash |
| EVD-004 | Description | System | Name | YYYY-MM-DD HH:MM | Path / bucket | Hash |
| EVD-005 | Description | System | Name | YYYY-MM-DD HH:MM | Path / bucket | Hash |
| EVD-006 | Description | System | Name | YYYY-MM-DD HH:MM | Path / bucket | Hash |
| Timestamp (UTC) | Audience | Channel | Message summary | Approved |
|---|---|---|---|---|
| YYYY-MM-DD HH:MM | Internal / Customer / Regulator | Email / Slack | Summary | Name |
| YYYY-MM-DD HH:MM | Internal / Customer / Regulator | Email / Slack | Summary | Name |
| YYYY-MM-DD HH:MM | Internal / Customer / Regulator | Email / Slack | Summary | Name |
| YYYY-MM-DD HH:MM | Internal / Customer / Regulator | Email / Slack | Summary | Name |
| Section | Notes |
|---|---|
| What worked | Controls and decisions that reduced impact |
| What failed | Control gaps, workflow delays, unclear ownership |
| Root-cause analysis | Technical and process-level causes with confidence levels |
| Residual risk | Unresolved risks remaining after closure |
| ID | Finding | Corrective action | Owner | Due date | Priority | Status |
|---|---|---|---|---|---|---|
| CA-001 | Finding | Action | Name | YYYY-MM-DD | H / M / L | Open / Closed |
| CA-002 | Finding | Action | Name | YYYY-MM-DD | H / M / L | Open / Closed |
| CA-003 | Finding | Action | Name | YYYY-MM-DD | H / M / L | Open / Closed |
| CA-004 | Finding | Action | Name | YYYY-MM-DD | H / M / L | Open / Closed |
| CA-005 | Finding | Action | Name | YYYY-MM-DD | H / M / L | Open / Closed |
| CA-006 | Finding | Action | Name | YYYY-MM-DD | H / M / L | Open / Closed |