Incident response planning
When a breach happens, the first 24 hours determine whether it's a manageable incident or a business-ending catastrophe. This guide shows you exactly what to do.
Critical Window
The first 24 hours
Every minute matters. Here's the timeline your team should follow when a breach is confirmed.
Confirm the incident is real (not a false positive). Activate the incident response team. Begin documentation.
Contain the threat — isolate affected systems, block malicious IPs, disable compromised accounts. Preserve evidence.
Assess scope — determine what data and systems are affected. Notify legal counsel and cyber insurance carrier.
Begin eradication — remove malware, close the attack vector. Start recovery planning for critical systems.
Begin restoring critical systems from clean backups. Determine regulatory notification obligations. Draft communications.
Framework
The 5 phases of incident response
Based on the NIST Incident Response framework — the industry standard used by organizations of all sizes.
Preparation
Build your incident response team, define roles and responsibilities, establish communication channels, and create playbooks for common scenarios before an incident occurs. Preparation is the most important phase — the middle of a breach is the worst time to figure out your plan.
Detection & Analysis
Identify that an incident has occurred, determine its scope and severity, and collect initial evidence. The faster you detect and classify an incident, the more options you have for containment and the less damage you sustain.
Containment
Stop the bleeding. Isolate affected systems to prevent the incident from spreading while maintaining enough evidence for investigation. There are two containment strategies: short-term (stop it now) and long-term (keep it stopped while you investigate).
Eradication & Recovery
Remove the threat from your environment completely, restore affected systems from clean backups, and verify that the attacker has no remaining access. Rushing recovery without complete eradication leads to re-infection.
Post-Incident Review
Conduct a blameless post-mortem to document what happened, what worked, what failed, and what changes will prevent recurrence. This phase turns every incident into an improvement to your security posture.
Compliance
Breach notification requirements
HIPAA
Notify HHS within 60 days of discovery for breaches affecting 500+ individuals. Notify affected individuals without unreasonable delay.
IRS / FTC
Tax preparers must notify the IRS, state tax agencies, and affected clients. FTC Safeguards Rule requires a written incident response plan.
State Laws
Most states require notification within 30-60 days. Some require notification to the state attorney general. Requirements vary by state.
PCI-DSS
Notify your acquiring bank and payment card brands within 24-72 hours. Engage a PCI Forensic Investigator.
Don't wait for a breach to write your plan
We build custom incident response plans for businesses of all sizes. Compliant, actionable, and ready when you need them.
