- Why have an incident response?
- Clarifying the Myths
- Incident response plan links & references
- Incident response alignment & maturity checklist
- PRE-Operational Procedures Incident/Response
- Cybersecurity/Operational/Compliance Incident Response ( NCSC ) [SYSTEM] template
- Definition of purpose : Post mortem / Lessons learned log
This guide has been made by Myself & referencing UK NCSC references please visit NCSC for more info and to draw & practice your own incident/response plan
Why have an incident response?
Take it as a guide. It shows how and who will make the decisions during a cyber-incident.
Developing an incident response plan is a critical pillar towards a robust technical response capability during a cyber attack
Exercising and training on the incident response plan is crucial. Continuous integration into risk management processes can also significantly reduce your overall cyber-risk. By preparing and regularly updating your plan, you can stay ahead of evolving threats and ensure your organization remains resilient.
Stakeholder & Leadership buy in
Integration with a solid security policy: The plan should align with the organization’s overarching security framework. This alignment ensures consistency and clarity.
Leadership buy-in: Executive support is critical for allocating resources, setting priorities, and fostering a culture of preparedness.
Clarifying the Myths
Myth 1: It’s better to keep quiet after a cyber-incident or breach
Many organizations assume staying silent can help them avoid legal issues or penalties. However, under data protection law and Network and Information Systems Regulations, it is mandatory to report incidents that meet a certain threshold.
Reporting incidents can reduce enforcement penalties, help protect others and contribute to a collective understanding of emerging threats.
Myth 2: There’s no help available after an attack
Contrary to this belief, there are extensive resources and support systems available to organizations that report incidents.
The NCSC (National Cyber Security Centre) and other agencies offer technical advice, secure communication channels, and strategic guidance, helping organizations recover from attacks and mitigate further damage.
Myth 3: Reporting to one organization is enough
Many believe reporting a cyber incident to just one authority covers all responsibilities. However, organizations may need to notify several different agencies, depending on the nature of the attack. For example:
- NCSC for incidents involving unauthorized access
- Action Fraud for incidents involving financial loss
- ICO (Information Commissioner’s Office) for personal data breaches
- OFSI (Office of Financial Sanctions Implementation) if sanctions laws are breached (e.g., paying ransomware)
Myth 4: It’s impossible to detect cyber-attacks early
There are tools available to detect potential attacks before they escalate. For instance, the NCSC offers an Early Warning service that alerts organizations of potential threats based on their network activity.
Additionally, the NCA (National Crime Agency) works to identify cyber threats before they impact businesses.
Myth 5: Paying a ransom will recover your data
Some believe that paying the ransom guarantees the return or deletion of stolen data. This is false. In many cases, criminals retain or even resell data after the ransom is paid.
Law enforcement agencies advise against paying ransoms. This includes the NCA. Paying ransoms encourages criminal activity and does not guarantee data recovery.
Myth 6: NCSC and NCA will share information with regulators
These organizations encourage transparency. However, they do not share confidential information with regulators, such as the ICO, without the organization’s permission.
Their role is to help protect businesses and respond to threats, not to enforce penalties.
Incident response plan links & references
References & links from CIS/NIST /CSC & ICO UK
| References | Link |
|---|---|
| NIST/CISA/NCSC – Incident Response | Preparation Resources – Incident Response | CSRC | CSRC |
| CISA Basics | https://www.cisa.gov/sites/default/files/publications/Incident-Response-Plan-Basics_508c.pdf |
| NIST Cybersecurity Response | NIST Special Publication (SP) 800-184, Guide for Cybersecurity Event Recovery |
| NCSC – Incident Response | Incident management |
| GDPR UK Cybersecurity ICO references | https://ico.org.uk/for-organisations/security-outcomes/ |
| Training Exercise’s ( CISA , ISACA , NIST, NCSC ) | NCSC, Exercise in a Box (ncsc.gov.uk) CISA, After-Action Report/Improvement Plan template CISA, CISA Tabletop Exercise Packages CISA, Cybersecurity Scenarios CISA, Incident Response Training CISA, Incident Response Training playlist for YouTube ISACA, Cybersecurity Incident Response Exercise Guidance NIST, Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities (SP 800-84) Appendix: Incident timelines – NCSC.GOV.UK – Appendix Incident Timelines |
Incident response alignment & maturity checklist
Mission
- Define the purpose and objectives of the incident response plan, aligning it with the organization’s mission.
Strategies and Goals
- Outline specific strategies and goals for handling incidents effectively.
Senior Management Approval & Roles
- Ensure the plan is reviewed and approved by senior management, with agreed roles defined.
Organizational Approach to Incident Response
- Describe the method for responding to incidents, including roles and responsibilities.
Exercise Approach
- Outline the method for testing the incident response plan, including roles and responsibilities.
Communication Plan
- Detail internal and external communication strategies during an incident.
Metrics for Measuring Effectiveness
- Establish metrics to evaluate incident response capabilities and effectiveness over time.
Roadmap for Maturing Capability
- Provide a roadmap for enhancing and maturing incident response capabilities.
Integration with Overall Organization
- Explain how the incident response integrates with broader processes like BCP, risk, or crisis management plans.
Annual Review and Updates
- Commit to an annual review and update of the incident response plan to maintain relevance and effectiveness.
Incident Severity Framework with Actionable Steps
Severity Levels and Definitions
| Severity Level | Definition | Example Scenarios |
|---|---|---|
| Minor (Localized) | Affects a small, localized area with limited business impact. Easily contained and resolved. | – Login issues for a few users. – Single phishing email clicked without compromise. – Accidental PII sharing mitigated quickly without escalation. |
| Moderate (Widespread) | Impacts multiple areas/systems with significant business disruption but not critical. | – Department-wide application outage. – Multiple phishing attempts affecting several users but contained. – Small-scale data breach requiring documentation. |
| Major (Organizational) | Affects the entire organization or critical systems, severely impacting business operations. | – Malware spreading across key systems. – Successful phishing compromising sensitive accounts. – Major PII data breach requiring regulatory notification. |
| Critical (Disaster) | Catastrophic incident causing widespread business disruption, halting operations. | – Organization-wide system outage. – Sophisticated cyber-attack compromising infrastructure. – Massive PII breach requiring legal and regulatory intervention. |
Operational Actions by Severity
| Element | Minor | Moderate | Major | Critical |
|---|---|---|---|---|
| Incident Response Plan | Not required. Trigger problem management. | Required. Cross-department coordination. | Full activation. Organization-wide response. | Full disaster recovery procedures activated. |
| Escalation | Escalate if impact spreads or reveals underlying risks. | Escalate to senior teams for containment and monitoring. | Escalate to executive teams and crisis management groups. | Escalate to board, law enforcement, and external agencies as needed. |
| COMMS | Internal communication (templates). | Broader internal comms; notify external parties if required. | Enterprise-wide comms; regulatory notifications as necessary. | Legal, regulatory, and enterprise-wide comms to all stakeholders. |
| Post-Incident Review (PIR) | Basic review for improvements. | Root cause analysis with key team input. | System-wide review; focus on systemic gaps and mitigation plans. | Comprehensive review; involve third-party evaluations for compliance. |
| DOCUMENTS | Record for tracking and future analysis. | Detailed reporting for compliance and internal audits. | Comprehensive records for regulatory and organizational needs. | Full-scale documentation for legal, regulatory, and disaster recovery. |
Specific Categories of Incidents
| Category | Example Scenarios |
|---|---|
| Operational (IT) | – Login or system feature issues (Minor). – Department-wide outages (Moderate). – Organization-wide downtime (Major or Critical). |
| Cybersecurity | – Single phishing attempt with no compromise (Minor). – Malware spreading across multiple systems (Moderate). – Sophisticated cyberattack (Critical). |
| GDPR/Compliance | – Isolated PII exposure mitigated quickly (Minor). – Breach affecting small groups requiring documentation (Moderate). – Massive data breach (Critical). |
Additional Considerations for Each Incident Severity Level:
- Escalation Procedures:
- Escalation triggers should be clear for each level, ensuring that incidents are appropriately elevated if the scope or impact increases.
- Criteria for escalation include spreading of the issue, failure to contain, or detection of potential security breaches.
- Communication Plans:
- Internal communication is essential at all levels to keep teams informed and avoid confusion.
- External communication plans should be predefined for more severe incidents, particularly those involving cybersecurity and compliance (e.g., data breaches that require customer notification).
- Post-Incident Review:
- Post-Incident Review (PIR) ensures that each incident is analysed for lessons learned, which can lead to process improvements.
- Focus on preventing recurrence through better monitoring, training, and process updates.
- Documentation:
- Incident documentation is critical at every level, ensuring that a comprehensive record is maintained for auditing, compliance, and continuous improvement purposes.
Roles and Responsibilities for Incident Response Example
- Generic template of roles and responsibilities usually used on an incident/response plan
| Role | Primary Responsibility | Scope | Key Focus |
|---|---|---|---|
| Incident Response Coordinator | Oversees the entire incident response process. | Coordinates activities across all teams and ensures NIST framework adherence. | Managing response activities, ensuring timely escalation, and overseeing post-incident reporting. |
| Senior Leadership (CEO/Executives) | Strategic decision-making and resource allocation. | Aligns incident response with organizational goals and provides resources for resolution. | High-level crisis management, decision-making, and public communication where needed. |
| IT Security Lead | Technical incident detection, analysis, and mitigation. | Leads the technical team in identifying and addressing cybersecurity threats. | Containment, eradication, recovery, and prevention strategies to minimize damage. |
| Data Protection Officer (DPO) | Ensures data privacy compliance during and after incidents. | Focuses on regulatory compliance, particularly GDPR and other data protection laws. | Notifying regulators, minimizing compliance risks, and safeguarding data privacy. |
| Detection and Analysis Team | Identifies and analyzes threats or breaches. | Monitors systems, conducts forensic investigations, and determines the scope of incidents. | Threat identification, detailed root cause analysis, and detection improvement. |
| Containment and Eradication Team | Executes containment and eradication strategies. | Works to isolate the threat, mitigate immediate risks, and remove malicious elements. | Containing the incident, removing malicious files, and protecting systems from further compromise. |
| Recovery Team | Leads system restoration and operational recovery. | Ensures systems are restored to normal operations while maintaining security integrity. | System recovery, data restoration, and testing to verify that vulnerabilities are resolved. |
| Compliance and Risk Team | Oversees risk and regulatory impact. | Assesses risks to business operations, legal liabilities, and regulatory obligations. | Risk assessment, compliance verification, and alignment with regulatory requirements (e.g., GDPR, PCI). |
| Communication Manager | Manages internal and external communication during incidents. | Coordinates communication plans with leadership, technical teams, and legal counsel. | Transparent and consistent messaging to stakeholders, customers, regulators, and the public. |
| Legal Counsel | Provides legal oversight during incident response. | Ensures legal compliance in breach notifications and communication with third parties. | Mitigating legal risks, reviewing contracts, and managing litigation risks if applicable. |
| Training and Awareness Coordinator | Leads training and preparedness initiatives. | Ensures staff are equipped to respond effectively to incidents through regular training. | Incident response training, policy reviews, and raising awareness of cyber threats. |
| Audit and Review Lead | Oversees post-incident evaluations and lessons learned. | Ensures thorough documentation and review of the incident response process. | Root cause analysis, evaluating gaps in the response plan, and updating policies and procedures. |
PRE-Operational Procedures Incident/Response
The purpose of the Operational Procedures Incident/Response Checklist is to ensure that the organisation has a clear, structured, and efficient set of pre-defined procedures.
This checklist is aligned with industry standards. These include ITIL (Information Technology Infrastructure Library) and CISA (Certified Information Systems Auditor). It is designed to guide the organisation in operational readiness, incident response, and continuous improvement.
- Confidentiality:
- Ensures that sensitive information is only accessible to those who are authorized to view it.
- Techniques to protect confidentiality include encryption, access controls, and authentication methods.
- Integrity:
- Ensures that data remains accurate and trustworthy and is not altered by unauthorized individuals.
- Integrity is maintained using hashing, checksum, and digital signatures.
- Availability:
- Ensures that information and resources are accessible to authorized users when needed.
- Measures to ensure availability include redundancy, failover mechanisms, and backup solutions.
Train Staff
- Conduct regular training on security, operations, and data protection.
Legal Review
- Consult a legal advisor to ensure compliance with GDPR and Data Protection laws.
Engage with NCSC
- Build relationships with the National Cyber Security Centre (NCSC) for risk management and briefings.
Meet Law Enforcement Agencies (LEA)
- Establish contacts with local law enforcement and Action Fraud for incident reporting.
Print and Distribute IRP
- Provide printed copies of the Incident Response Plan (IRP) and contact lists to key personnel.
Develop Staffing/Stakeholder Plan
- Define roles and stakeholders to notify, including ICO reporting for data breaches.
Review IRP Every 6 Months
- Conduct regular reviews of the IRP to align with evolving threats and regulations.
Prepare Media Responses
- Draft and pre-approve media statements for incident communication.
Identify External Technical Resources
- Maintain a list of external vendors for rapid incident response support.
Conduct Tabletop Exercises (TTX)
- Simulate attack scenarios to test and refine the IRP, including UK-specific regulations.
Define SLA and RTO
- Define and review SLAs, ensuring RTO compliance within 48 hours.
Prepare Operational Workarounds
- Develop Business Continuity Plans (BCP) for critical departments.
Identify System Custodians
- Confirm custodian responsibility for systems and ensure incident plans exist.
Establish Incident Levels
- Categorize incidents by severity and ensure everyone knows response triggers.
Create Chat
- Set up a dedicated chat for incident communication.
Assign Roles for Outages
- Assign Incident Manager, Technical Manager, and Communication Manager for each incident.
Activate Response Plan
- Trigger the appropriate response plan based on incident type and severity.
Draft Communication Plan
- Ensure clear communication methods during incidents, including failover options.
Implement Recovery Plan
- Recover services in line with RTO and RPO targets.
Transition to Normal Operations
- Resume normal operations post-recovery while monitoring system stability.
Post-Mortem Analysis
- Conduct a post-incident review and update the IRP and risk register based on lessons learned.
Cybersecurity/Operational/Compliance Incident Response ( NCSC ) [SYSTEM] template
| Step | Action | Def | core | Category | Actions |
|---|---|---|---|---|---|
| 0. Risk | Mitigate risks before incidents occur. | Ensure preparatory measures are in place (e.g., network diagrams, IP ranges). | prep | Operational | Document all key systems to reduce risk. |
| 0.1 SLA & Category | Align recovery times with SLA/RTO targets. | Categorize incidents; ensure BAU recovery within 48 hours and ICO reporting within 72 hours. | Prep | Compliance | Ensure evidence capture processes meet SLA requirements. |
| 1. Determine Incident | Identify incidents using detection methods (e.g., MITRE ATT&CK). | Use logs, monitoring tools, and user/third-party reports to determine scope and impact. | Detect | Cybersecurity Only | Ensure logs are retained for 3 months; enable SIEM tools. |
| 1.1 Analyze Indicators | Investigate anomalous activities. | Detect unusual logins, network traffic, or unauthorized access. | Respond | Cybersecurity, Compliance | Ensure logs are time-synced and asset documentation is complete. |
| 1.2 Correlate Information | Combine data for incident context. | Integrate alerts, logs, and network traffic to assess the incident’s full impact. | Respond | Analysis | Use centralized logging and correlate DNS/DHCP/firewall data. |
| 1.3 Perform Research | Research attacker behavior and motives. | Use threat intelligence and consult experts to understand adversaries. | Respond | Cybersecurity Only | Leverage sandbox analysis and threat intel feeds. |
| 1.4 Report Incident | Notify stakeholders and trigger IRP. | Inform internal and external personnel as per incident classification and severity. | Notify | Notification | Include media/legal handling and capture evidence for potential cases. |
| 2. Preserve Evidence | Secure forensic data for analysis. | Preserve memory, disk images, and system snapshots for incident investigation. | Contain | Containment | Develop evidence capture protocols, ensure encryption compatibility. |
| 5. Contain Incident | Limit damage by isolating affected systems. | Block traffic, shut down systems, or restrict access to prevent spread. | Contain | Containment | Train staff on containment strategies through regular exercises. |
| 6. Eradicate Incident | Remove malicious components from the network. | Ensure all malware, backdoors, and vulnerabilities are fully addressed. | Erradication | Eradication | Synchronize remediation actions across systems for full eradication. |
| 7. Recover Systems | Restore systems to normal operation. | Confirm backups are clean, verify restored data integrity, and resume BAU. | Core Response (Recover) | Recovery | Use offline backups and ensure only clean data is restored. |
| 7.3 Implement Monitoring | Deploy monitoring to detect further threats. | Set up enhanced tracking for unusual activity or related incidents post-recovery. | Core Response (Recover) | Monitoring | Use continuous tools to identify future anomalies. |
| 8. Follow-Up Report | Document the incident and actions taken. | Create a detailed post-incident report covering causes, response, and lessons learned. | Close Down | Post-Incident Review | Ensure reports include legal, operational, and technical aspects. |
| 9. Lessons-Learned Meeting | Review incident effectiveness and areas for improvement. | Organize a meeting to gather insights and identify gaps in the response process. | Close Down | Post-Incident Review | Update IRP and risk register with improvements. |
| 10. Feedback on Recovery | Gather team feedback to enhance the recovery process. | Assess recovery efficiency and address gaps in procedural or technical actions. | Close Down | Post-Incident Review | Collect input to strengthen future response plans. |
Post Mortem – Lesson learned Log [System] – Incident/Response
Definition of purpose : Post mortem / Lessons learned log
The purpose of the Post Mortem – Lessons Learned Log for Incident Response is to capture, analyse, and document insights gained from past incidents
This process helps to ensure that the organisation learns from both successful and unsuccessful elements of its response, ultimately improving future incident management, reducing the likelihood of repeat incidents, and enhancing overall resilience.

