Incident response plans: Examples and templates

With contributions from Colin Belcourt, Monique Bardawil, and Elizabeth MacDougall.

Loading table of contents.

Related

Decorative Featured Image

What is incident response preparedness?

Decorative Featured Image

The real cost of a data breach in 2024

Decorative Featured Image

Threat hunting 101: An essential part of your cyber defence
Loading table of contents.

In the event of a cyber attack on your business, do you have a plan in place to minimize impact and restore normal operations as soon as possible?

That’s what an incident response (IR) plan is for. These documents are designed to give organizations a framework they can follow to accomplish two major things: in a practical sense, IR plans help you prepare for, respond to, and recover from compromised cyber security. But in a broader sense, they help enhance cyber maturity, letting you strengthen your existing defences.

Effective IR planning and preparedness are vital: the longer it takes a company to detect and address a breach, the more costly the breach. When you do detect an attack, how fast you act may mean the difference between continued business and closing your doors permanently.

Of course, building an IR plan for your business may feel challenging. Where do you start, and what do you include?

That’s why we recommend leveraging existing incident response templates from reputable sources. These documents are designed to help your business map out the processes and procedures to handle, analyze, and appropriately respond to cyber incidents.

In this blog, you’ll learn:

What is an incident response plan template?

An incident response plan template is a document designed to help businesses develop their own IR plan and procedures. These templates are often based on existing frameworks, such as the National Institute of Standards and Technology’s (NIST) Computer Security Incident Handling Guide or the SANS Institute’s Incident Handlers Handbook.

NIST divides IR activities into four phases:

1. Preparation — the work an organization does to get ready for incident response, including choosing the right tools and technology and ongoing team training. Other tasks involve:

2. Detection and analysis — this phase focuses on building processes to ensure your team can accurately spot an attack.

3. Containment, eradication, and recovery — in this phase, the goal is to minimize the impact of an incident and get your business back to secure operations as soon as possible.

4. Post-event activity — this phase focuses on taking the findings of an incident and applying them to strengthen defences and cyber security capabilities. What did your team learn? Are there areas for improvement?

The SANS Institute’s framework, meanwhile, expands this approach into 6 distinct phases, splitting some of what NIST categorizes as a single set of activities apart and emphasizing their individual importance:

  1. Preparation
  2. Identification
  3. Containment
  4. Eradication
  5. Recovery
  6. Lessons learned

Regardless of which framework your incident response plan template draws on, they provide a roadmap you can follow to develop your cyber security capabilities.

Why use a framework for IR planning?

IR plan templates help businesses develop effective response capabilities that follow cyber security best practices, no matter what resources they have to work with. Knowing how to get started and what processes you need to follow to deal with an attack isn’t always straightforward.

Small and mid-size businesses (SMBs) frequently lack the resources and expertise of larger enterprises, but they still face the same cyber threats. Put simply, no matter how small your business, you’re still a target, and must understand how to respond to an attack in order to protect critical operations and confidential data.

In response to these challenges, many SMBs leverage third-party cyber expertise to access skills, technology, and information. Using an incident response plan template gives SMBs a way to access that expertise. All those best practices have already been identified and mapped out for you to follow.

What’s more, using an IR plan template may also help you obtain new business contracts or even earn lower cyber insurance rates. These plans help formalize your cyber security policies, giving you a reference you can point to when potential business partners or regulatory bodies want proof that you’re taking necessary precautions to protect data, intellectual property, and operations.

What’s in an incident response plan template?

As mentioned above, most incident response plan templates will follow a common framework with similar elements. The exact steps will vary from business to business based on individual needs and requirements.

Broadly speaking, most IR plans will include the following:

An overview with objectives and scope

Determining the end goal of your IR plan, including specific recovery objectives, can help focus your efforts to better address your company’s immediate and urgent threats. This may include specific statements about the plan’s scope, including exclusions that limit its scope — for example, if you have multiple offices, your IR plan may only focus on a single geographic location, with other plans in place for other locations.

The IR scenarios the plan will address

In some cases, organizations draft multiple IR plans in response to major threats. While this specificity may be helpful, a single document to refer to in the event of an emergency will make it more likely that the individuals responding to the incident will take the right steps.

Producing a single, overall plan, with specific considerations for key scenarios, can be a great way to address these needs. To help get started with these specific scenarios, consider the following three cases:

Incident response roles and responsibilities

In the event of a cyber attack on your network, who will put your plan into action? Determining the key roles on your response team ahead of time and having them rehearse their IR plan will help ensure they can work faster and with more confidence. Be sure to include titles, contact information, and individual responsibilities to minimize uncertainty over who handles what.

Let’s take a quick look at some of the major roles and responsibilities of an incident response team:

Of course, not all SMBs will have the resources necessary to fill each of these roles. For example, a legal representative with the cyber security background needed to ensure chain of custody is a highly specialized role that smaller organizations will have difficulty accessing. Partnering with a third party or external breach counsel can help fill the gaps and ensure you’ve got the coverage you need.

A sequence of incident response events

This section will be the meat and potatoes of your incident response plan: the actual sequence of events your team will follow to respond to an active cyber threat. Think of this as a guideline to help you identify the steps you should take to proceed with your response, keeping in mind that not everything will be relevant to your situation.

As we’ve mentioned before, this exact process will vary depending on the nature of the attack and your business. Here’s a sample sequence of events, drawing from both SANS and NIST publications:

Convene

Identification