1. Why have an incident response?
  2. Clarifying the Myths
  3. Incident response plan links & references
  4. Incident response alignment & maturity checklist
    1. Incident Severity Framework with Actionable Steps
      1. Severity Levels and Definitions
      2. Operational Actions by Severity
      3. Specific Categories of Incidents
    2. Additional Considerations for Each Incident Severity Level:
    3. Roles and Responsibilities for Incident Response Example
  5. PRE-Operational Procedures Incident/Response
  6. Cybersecurity/Operational/Compliance Incident Response ( NCSC ) [SYSTEM] template
    1. Post Mortem – Lesson learned Log [System] – Incident/Response
  7. Definition of purpose : Post mortem / Lessons learned log

This guide has been made by Myself & referencing UK NCSC references please visit NCSC for more info and to draw & practice your own incident/response plan

https://www.ncsc.gov.uk/

Why have an incident response?

Take it as a guide. It shows how and who will make the decisions during a cyber-incident.

Developing an incident response plan is a critical pillar towards a robust technical response capability during a cyber attack

Exercising and training on the incident response plan is crucial. Continuous integration into risk management processes can also significantly reduce your overall cyber-risk. By preparing and regularly updating your plan, you can stay ahead of evolving threats and ensure your organization remains resilient.

Stakeholder & Leadership buy in

Integration with a solid security policy: The plan should align with the organization’s overarching security framework. This alignment ensures consistency and clarity.

Leadership buy-in: Executive support is critical for allocating resources, setting priorities, and fostering a culture of preparedness.

Clarifying the Myths

Myth 1: It’s better to keep quiet after a cyber-incident or breach

Many organizations assume staying silent can help them avoid legal issues or penalties. However, under data protection law and Network and Information Systems Regulations, it is mandatory to report incidents that meet a certain threshold.

Reporting incidents can reduce enforcement penalties, help protect others and contribute to a collective understanding of emerging threats.

Myth 2: There’s no help available after an attack

Contrary to this belief, there are extensive resources and support systems available to organizations that report incidents.

The NCSC (National Cyber Security Centre) and other agencies offer technical advice, secure communication channels, and strategic guidance, helping organizations recover from attacks and mitigate further damage.

Myth 3: Reporting to one organization is enough

Many believe reporting a cyber incident to just one authority covers all responsibilities. However, organizations may need to notify several different agencies, depending on the nature of the attack. For example:

  • NCSC for incidents involving unauthorized access
  • Action Fraud for incidents involving financial loss
  • ICO (Information Commissioner’s Office) for personal data breaches
  • OFSI (Office of Financial Sanctions Implementation) if sanctions laws are breached (e.g., paying ransomware)

Myth 4: It’s impossible to detect cyber-attacks early

There are tools available to detect potential attacks before they escalate. For instance, the NCSC offers an Early Warning service that alerts organizations of potential threats based on their network activity.

Additionally, the NCA (National Crime Agency) works to identify cyber threats before they impact businesses.

Myth 5: Paying a ransom will recover your data

Some believe that paying the ransom guarantees the return or deletion of stolen data. This is false. In many cases, criminals retain or even resell data after the ransom is paid.

Law enforcement agencies advise against paying ransoms. This includes the NCA. Paying ransoms encourages criminal activity and does not guarantee data recovery.

Myth 6: NCSC and NCA will share information with regulators

These organizations encourage transparency. However, they do not share confidential information with regulators, such as the ICO, without the organization’s permission.

Their role is to help protect businesses and respond to threats, not to enforce penalties.

References & links from CIS/NIST /CSC & ICO UK

ReferencesLink
NIST/CISA/NCSC – Incident ResponsePreparation Resources – Incident Response | CSRC | CSRC
CISA Basicshttps://www.cisa.gov/sites/default/files/publications/Incident-Response-Plan-Basics_508c.pdf
NIST Cybersecurity ResponseNIST Special Publication (SP) 800-184, Guide for Cybersecurity Event Recovery
NCSC – Incident ResponseIncident management
GDPR UK Cybersecurity ICO referenceshttps://ico.org.uk/for-organisations/security-outcomes/
Training Exercise’s ( CISA , ISACA , NIST, NCSC )NCSC, Exercise in a Box (ncsc.gov.uk)

CISA, After-Action Report/Improvement Plan template

CISA, CISA Tabletop Exercise Packages

CISA, Cybersecurity Scenarios

CISA, Incident Response Training

CISA, Incident Response Training playlist for YouTube

ISACA, Cybersecurity Incident Response Exercise Guidance

NIST, Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities (SP 800-84)

Appendix: Incident timelines – NCSC.GOV.UK – Appendix Incident Timelines

Incident response alignment & maturity checklist

Mission

  • Define the purpose and objectives of the incident response plan, aligning it with the organization’s mission.

Strategies and Goals

  • Outline specific strategies and goals for handling incidents effectively.

Senior Management Approval & Roles

  • Ensure the plan is reviewed and approved by senior management, with agreed roles defined.

Organizational Approach to Incident Response

  • Describe the method for responding to incidents, including roles and responsibilities.

Exercise Approach

  • Outline the method for testing the incident response plan, including roles and responsibilities.

Communication Plan

  • Detail internal and external communication strategies during an incident.

Metrics for Measuring Effectiveness

  • Establish metrics to evaluate incident response capabilities and effectiveness over time.

Roadmap for Maturing Capability

  • Provide a roadmap for enhancing and maturing incident response capabilities.

Integration with Overall Organization

  • Explain how the incident response integrates with broader processes like BCP, risk, or crisis management plans.

Annual Review and Updates

  • Commit to an annual review and update of the incident response plan to maintain relevance and effectiveness.

Incident Severity Framework with Actionable Steps

Severity Levels and Definitions

Severity LevelDefinitionExample Scenarios
Minor (Localized)Affects a small, localized area with limited business impact. Easily contained and resolved.– Login issues for a few users.

– Single phishing email clicked without compromise.

– Accidental PII sharing mitigated quickly without escalation.
Moderate (Widespread)Impacts multiple areas/systems with significant business disruption but not critical.– Department-wide application outage.

– Multiple phishing attempts affecting several users but contained.

– Small-scale data breach requiring documentation.
Major (Organizational)Affects the entire organization or critical systems, severely impacting business operations.– Malware spreading across key systems.

– Successful phishing compromising sensitive accounts.

– Major PII data breach requiring regulatory notification.
Critical (Disaster)Catastrophic incident causing widespread business disruption, halting operations.– Organization-wide system outage.

– Sophisticated cyber-attack compromising infrastructure.

– Massive PII breach requiring legal and regulatory intervention.

Operational Actions by Severity

ElementMinorModerateMajorCritical
Incident Response PlanNot required. Trigger problem management.Required. Cross-department coordination.Full activation. Organization-wide response.Full disaster recovery procedures activated.
EscalationEscalate if impact spreads or reveals underlying risks.Escalate to senior teams for containment and monitoring.Escalate to executive teams and crisis management groups.Escalate to board, law enforcement, and external agencies as needed.
COMMSInternal communication (templates).Broader internal comms; notify external parties if required.Enterprise-wide comms;

regulatory notifications as necessary.
Legal, regulatory, and enterprise-wide comms to all stakeholders.
Post-Incident Review (PIR)Basic review for improvements.Root cause analysis with key team input.System-wide review;
focus on systemic gaps and mitigation plans.
Comprehensive review; involve third-party evaluations for compliance.
DOCUMENTSRecord for tracking and future analysis.Detailed reporting for compliance and internal audits.Comprehensive records

for regulatory and organizational needs.
Full-scale documentation for legal, regulatory, and disaster recovery.

Specific Categories of Incidents

CategoryExample Scenarios
Operational (IT)– Login or system feature issues (Minor).

– Department-wide outages (Moderate).

– Organization-wide downtime (Major or Critical).
Cybersecurity– Single phishing attempt with no compromise (Minor).

– Malware spreading across multiple systems (Moderate).

– Sophisticated cyberattack (Critical).
GDPR/Compliance– Isolated PII exposure mitigated quickly (Minor).

– Breach affecting small groups requiring documentation (Moderate).

– Massive data breach (Critical).

Additional Considerations for Each Incident Severity Level:

  1. Escalation Procedures:
    • Escalation triggers should be clear for each level, ensuring that incidents are appropriately elevated if the scope or impact increases.
    • Criteria for escalation include spreading of the issue, failure to contain, or detection of potential security breaches.
  2. Communication Plans:
    • Internal communication is essential at all levels to keep teams informed and avoid confusion.
    • External communication plans should be predefined for more severe incidents, particularly those involving cybersecurity and compliance (e.g., data breaches that require customer notification).
  3. Post-Incident Review:
    • Post-Incident Review (PIR) ensures that each incident is analysed for lessons learned, which can lead to process improvements.
    • Focus on preventing recurrence through better monitoring, training, and process updates.
  4. Documentation:
    • Incident documentation is critical at every level, ensuring that a comprehensive record is maintained for auditing, compliance, and continuous improvement purposes.

Roles and Responsibilities for Incident Response Example

  • Generic template of roles and responsibilities usually used on an incident/response plan
RolePrimary ResponsibilityScopeKey Focus
Incident Response CoordinatorOversees the entire incident response process.Coordinates activities across all teams and ensures NIST framework adherence.Managing response activities, ensuring timely escalation, and overseeing post-incident reporting.
Senior Leadership (CEO/Executives)Strategic decision-making and resource allocation.Aligns incident response with organizational goals and provides resources for resolution.High-level crisis management, decision-making, and public communication where needed.
IT Security LeadTechnical incident detection, analysis, and mitigation.Leads the technical team in identifying and addressing cybersecurity threats.Containment, eradication, recovery, and prevention strategies to minimize damage.
Data Protection Officer (DPO)Ensures data privacy compliance during and after incidents.Focuses on regulatory compliance, particularly GDPR and other data protection laws.Notifying regulators, minimizing compliance risks, and safeguarding data privacy.
Detection and Analysis TeamIdentifies and analyzes threats or breaches.Monitors systems, conducts forensic investigations, and determines the scope of incidents.Threat identification, detailed root cause analysis, and detection improvement.
Containment and Eradication TeamExecutes containment and eradication strategies.Works to isolate the threat, mitigate immediate risks, and remove malicious elements.Containing the incident, removing malicious files, and protecting systems from further compromise.
Recovery TeamLeads system restoration and operational recovery.Ensures systems are restored to normal operations while maintaining security integrity.System recovery, data restoration, and testing to verify that vulnerabilities are resolved.
Compliance and Risk TeamOversees risk and regulatory impact.Assesses risks to business operations, legal liabilities, and regulatory obligations.Risk assessment, compliance verification, and alignment with regulatory requirements (e.g., GDPR, PCI).
Communication ManagerManages internal and external communication during incidents.Coordinates communication plans with leadership, technical teams, and legal counsel.Transparent and consistent messaging to stakeholders, customers, regulators, and the public.
Legal CounselProvides legal oversight during incident response.Ensures legal compliance in breach notifications and communication with third parties.Mitigating legal risks, reviewing contracts, and managing litigation risks if applicable.
Training and Awareness CoordinatorLeads training and preparedness initiatives.Ensures staff are equipped to respond effectively to incidents through regular training.Incident response training, policy reviews, and raising awareness of cyber threats.
Audit and Review LeadOversees post-incident evaluations and lessons learned.Ensures thorough documentation and review of the incident response process.Root cause analysis, evaluating gaps in the response plan, and updating policies and procedures.

PRE-Operational Procedures Incident/Response

The purpose of the Operational Procedures Incident/Response Checklist is to ensure that the organisation has a clear, structured, and efficient set of pre-defined procedures.

This checklist is aligned with industry standards. These include ITIL (Information Technology Infrastructure Library) and CISA (Certified Information Systems Auditor). It is designed to guide the organisation in operational readiness, incident response, and continuous improvement.

  • Confidentiality:
    • Ensures that sensitive information is only accessible to those who are authorized to view it.
    • Techniques to protect confidentiality include encryption, access controls, and authentication methods.
  • Integrity:
    • Ensures that data remains accurate and trustworthy and is not altered by unauthorized individuals.
    • Integrity is maintained using hashing, checksum, and digital signatures.
  • Availability:
    • Ensures that information and resources are accessible to authorized users when needed.
    • Measures to ensure availability include redundancy, failover mechanisms, and backup solutions.

Train Staff

  • Conduct regular training on security, operations, and data protection.

Legal Review

  • Consult a legal advisor to ensure compliance with GDPR and Data Protection laws.

Engage with NCSC

  • Build relationships with the National Cyber Security Centre (NCSC) for risk management and briefings.

Meet Law Enforcement Agencies (LEA)

  • Establish contacts with local law enforcement and Action Fraud for incident reporting.

Print and Distribute IRP

  • Provide printed copies of the Incident Response Plan (IRP) and contact lists to key personnel.

Develop Staffing/Stakeholder Plan

  • Define roles and stakeholders to notify, including ICO reporting for data breaches.

Review IRP Every 6 Months

  • Conduct regular reviews of the IRP to align with evolving threats and regulations.

Prepare Media Responses

  • Draft and pre-approve media statements for incident communication.

Identify External Technical Resources

  • Maintain a list of external vendors for rapid incident response support.

Conduct Tabletop Exercises (TTX)

  • Simulate attack scenarios to test and refine the IRP, including UK-specific regulations.

Define SLA and RTO

  • Define and review SLAs, ensuring RTO compliance within 48 hours.

Prepare Operational Workarounds

  • Develop Business Continuity Plans (BCP) for critical departments.

Identify System Custodians

  • Confirm custodian responsibility for systems and ensure incident plans exist.

Establish Incident Levels

  • Categorize incidents by severity and ensure everyone knows response triggers.

Create Chat

  • Set up a dedicated chat for incident communication.

Assign Roles for Outages

  • Assign Incident Manager, Technical Manager, and Communication Manager for each incident.

Activate Response Plan

  • Trigger the appropriate response plan based on incident type and severity.

Draft Communication Plan

  • Ensure clear communication methods during incidents, including failover options.

Implement Recovery Plan

  • Recover services in line with RTO and RPO targets.

Transition to Normal Operations

  • Resume normal operations post-recovery while monitoring system stability.

Post-Mortem Analysis

  • Conduct a post-incident review and update the IRP and risk register based on lessons learned.

Cybersecurity/Operational/Compliance Incident Response ( NCSC ) [SYSTEM] template


StepActionDefcoreCategoryActions
0. RiskMitigate risks before incidents occur.Ensure preparatory measures are in
place
(e.g., network diagrams, IP ranges).
prepOperationalDocument all key systems to reduce risk.
0.1 SLA & CategoryAlign recovery times with SLA/RTO targets.Categorize incidents; ensure BAU recovery within 48 hours and ICO reporting within 72 hours.PrepComplianceEnsure evidence capture processes meet SLA requirements.
1. Determine IncidentIdentify incidents using detection methods (e.g., MITRE ATT&CK).Use logs, monitoring tools, and user/third-party reports to determine scope and impact.DetectCybersecurity OnlyEnsure logs are retained for 3 months; enable SIEM tools.
1.1 Analyze IndicatorsInvestigate anomalous activities.Detect unusual logins, network traffic, or unauthorized access.RespondCybersecurity, ComplianceEnsure logs are time-synced and asset documentation is complete.
1.2 Correlate InformationCombine data for incident context.Integrate alerts, logs, and network traffic to assess the incident’s full impact.RespondAnalysisUse centralized logging and correlate DNS/DHCP/firewall data.
1.3 Perform ResearchResearch attacker behavior and motives.Use threat intelligence and consult experts to understand adversaries.RespondCybersecurity OnlyLeverage sandbox analysis and threat intel feeds.
1.4 Report IncidentNotify stakeholders and trigger IRP.Inform internal and external personnel as per incident classification and severity.NotifyNotificationInclude media/legal handling and capture evidence for potential cases.
2. Preserve EvidenceSecure forensic data for analysis.Preserve memory, disk images, and system snapshots for incident investigation.ContainContainmentDevelop evidence capture protocols, ensure encryption compatibility.
5. Contain IncidentLimit damage by isolating affected systems.Block traffic, shut down systems, or restrict access to prevent spread.ContainContainmentTrain staff on containment strategies through regular exercises.
6. Eradicate IncidentRemove malicious components from the network.Ensure all malware, backdoors, and vulnerabilities are fully addressed.ErradicationEradicationSynchronize remediation actions across systems for full eradication.
7. Recover SystemsRestore systems to normal operation.Confirm backups are clean, verify restored data integrity, and resume BAU.Core Response (Recover)RecoveryUse offline backups and ensure only clean data is restored.
7.3 Implement MonitoringDeploy monitoring to detect further threats.Set up enhanced tracking for unusual activity or related incidents post-recovery.Core Response (Recover)MonitoringUse continuous tools to identify future anomalies.
8. Follow-Up ReportDocument the incident and actions taken.Create a detailed post-incident report covering causes, response, and lessons learned.Close DownPost-Incident ReviewEnsure reports include legal, operational, and technical aspects.
9. Lessons-Learned MeetingReview incident effectiveness and areas for improvement.Organize a meeting to gather insights and identify gaps in the response process.Close DownPost-Incident ReviewUpdate IRP and risk register with improvements.
10. Feedback on RecoveryGather team feedback to enhance the recovery process.Assess recovery efficiency and address gaps in procedural or technical actions.Close DownPost-Incident ReviewCollect input to strengthen future response plans.

Post Mortem – Lesson learned Log [System] – Incident/Response

Definition of purpose : Post mortem / Lessons learned log

The purpose of the Post Mortem – Lessons Learned Log for Incident Response is to capture, analyse, and document insights gained from past incidents

This process helps to ensure that the organisation learns from both successful and unsuccessful elements of its response, ultimately improving future incident management, reducing the likelihood of repeat incidents, and enhancing overall resilience.