Incident Response
Incident response is the organised and planned approach to detecting, containing, eliminating and recovering from a cybersecurity incident. A well-documented and practised incident response plan significantly reduces the damage and recovery time following an attack.
Back to Dictionary- Dictionary
- Incident Response
Table of Contents
The incident response phases
NIST's incident response framework (SP 800-61) defines four phases:
- Preparation: Establish plans, teams and tools before an incident occurs. This includes defining roles, creating playbooks and ensuring that logging and monitoring are in place.
- Detection and analysis: Detect, identify and classify the incident's scope and severity using monitoring tools, threat intelligence and established indicators of compromise.
- Containment, eradication and recovery: Limit the damage, remove the root cause and restore normal operations. This phase often involves isolating affected systems, removing malware and restoring from backups.
- Post-incident activity: Conduct a thorough post-incident analysis, document lessons learnt and update procedures to prevent recurrence.
The incident response plan
An incident response plan (IRP) documents what the organisation does when a security incident occurs. It should contain:
- Contact lists and escalation procedures for key personnel
- Communication plans for both internal and external stakeholders
- Clearly defined roles and responsibilities for the response team
- Playbooks for specific incident types (ransomware, data breaches, phishing)
- Criteria for determining incident severity levels
- Legal and regulatory notification requirements
Test your plan: A plan that has never been exercised is not a plan. Regular tabletop exercises, where the team simulates an incident, reveal gaps and ensure that everyone knows their roles under pressure. Annual testing is a minimum; quarterly exercises are recommended for high-risk organisations.
CSIRT and incident response teams
A CSIRT (Computer Security Incident Response Team) is a dedicated group responsible for incident response. Even without a dedicated security team, clear roles should be assigned: who leads the response, who communicates with management, who contacts authorities and who is technically responsible.
Notification obligations
Certain incidents trigger statutory notification obligations. GDPR Article 33 requires notification to the supervisory authority within 72 hours for breaches posing a risk to data subjects. NIS2 requires initial notification within 24 hours. DORA has similar requirements for financial entities. The incident response plan must include a clear process for each type of notification.
Frequently Asked Questions about Incident Response
What is incident response?
Incident response is the organised and planned approach to detecting, containing, eliminating and recovering from a cybersecurity incident. It aims to minimise damage, reduce recovery time and prevent recurrence.
What are the four phases of incident response?
According to NIST SP 800-61, the four phases are: preparation, detection and analysis, containment/eradication/recovery, and post-incident activity. Each phase has distinct objectives and activities.
What should an incident response plan contain?
An incident response plan should contain contact lists, escalation procedures, communication plans, roles and responsibilities, playbooks for specific incident types, severity classification criteria and legal notification requirements.
What is a CSIRT?
A CSIRT (Computer Security Incident Response Team) is a dedicated group responsible for handling cybersecurity incidents. It can be an internal team or an external service, and national CSIRTs coordinate incident response at country level.
How often should you test your incident response plan?
Annual testing is a minimum, but quarterly tabletop exercises are recommended for high-risk organisations. Testing reveals gaps in the plan and ensures that team members know their roles under pressure.
Related Terms
Incident Management (ISO 27001)
A structured process for detecting, reporting, assessing and handling information security incidents to minimise damage and prevent recurrence.
iso_27001Information Security Policy
A top-level document establishing management's vision and commitment to information security. A mandatory requirement in ISO 27001 (Clause 5.2).
iso_27001Internal Audit (ISO 27001)
A systematic and independent review of the organisation's ISMS to assess conformity with ISO 27001 requirements and effectiveness of implementation.
iso_27001ISMS
An Information Security Management System (ISMS) is a systematic framework of policies, processes and controls for managing information security. The core requirement of ISO 27001.
iso_27001ISO 27001 Certification
A formal third-party verification that an organisation's ISMS meets the requirements in the ISO/IEC 27001 standard for information security management.
Related Articles
Info
.legal A/S
hello@dotlegal.com
+45 7027 0127
VAT-no: DK40888888
Support
support@dotlegal.com
+45 7027 0127
Need help?
Let me help you get started
+45 7027 0127 and I'll get you started
.legal is not a law firm and is therefore not under the supervision of the Bar Council.