Incident Severity Classification

Use this matrix to determine initial response priority and escalation path.

Critical

P1
Response: < 15 min

High

P2
Response: < 1 hour

Medium

P3
Response: < 4 hours

Low

P4
Response: < 24 hours

01 Preparation

Preparation is the foundation of effective incident response. This phase occurs before any incident takes place and focuses on building capabilities, defining roles, and establishing communication channels.

Establish IR team structure & RACI matrix
Deploy EDR/XDR, SIEM, and network monitoring tools
Create communication templates & stakeholder contact lists
Conduct tabletop exercises & phishing simulations
Maintain offline backups & immutable storage verification
Pre-configure forensic imaging & evidence handling kits
⚠ Critical: Review and update this playbook quarterly. Outdated contacts or missing tooling access is the #1 cause of response delays.

02 Detection & Analysis

Identify anomalies, validate alerts, and determine scope. Speed and accuracy here dictate the entire response trajectory.

Triage alerts from SIEM/SOC & correlate with threat intel
Determine initial scope: affected hosts, users, data, timelines
Classify severity (P1-P4) using the matrix above
Preserve volatile evidence (RAM, network captures, logs)
Isolate affected systems from critical networks (if safe)
Activate IR war room & notify legal/compliance if data breach suspected
🔍 CyberVault SOC Tip: Never delete logs or reboot compromised systems before imaging. Preserve chain of custody for forensic validity.

03 Containment, Eradication & Recovery

Stop the bleed, remove the threat, and restore normal operations. Balance speed with thoroughness to prevent reinfection.

Implement short-term containment (block IPs, disable accounts, isolate segments)
Identify root cause & attack vector (phishing, exploit, credential theft)
Perform malware removal, patch vulnerabilities, reset compromised credentials
Validate clean state via threat hunting & vulnerability scanning
Restore systems from verified clean backups
Implement long-term containment (WAF rules, MFA enforcement, network segmentation)
🔄 Recovery Note: Do not restore services until eradication is confirmed. Rushing reconnection is the most common cause of secondary breaches.

04 Post-Incident Activity

Learn, improve, and harden. This phase transforms incident data into organizational resilience.

Document complete timeline, actions taken, and evidence chain
Conduct blameless post-mortem / lessons learned session
Update detection rules, playbooks, and security controls
Submit regulatory notifications if required (GDPR, HIPAA, state laws)
Archive incident report & store in compliance repository
Schedule follow-up threat hunting & security awareness training
📈 Metric Focus: Track MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond). CyberVault clients average a 62% reduction in MTTR after playbook adoption.

🚨 Activate Incident Response

If you suspect a breach, ransomware infection, or active intrusion, bypass standard queues and contact our 24/7 Security Operations Center immediately.

24/7 SOC Hotline
+1 (800) 555-SECURE
Call Now

Need an Offline or Printable Version?

Download the full PDF playbook, incident report templates, and evidence handling checklists from the CyberVault Resource Hub.