The worst time to figure out who to call, what to do, and what to say is when your SIEM is screaming, the CEO is calling, and the attacker is still in your network. Every organization that’s been through a breach says the same thing afterward: “We wish we’d planned for this.” The ones who weathered it best are the ones who had a plan, rehearsed it, and knew their roles before the alarms went off.

An incident response plan isn’t a binder on a shelf. It’s a living playbook that tells your team exactly what to do in the first hour, the first day, and the first week of a security incident. Here’s how to build one that works when everything else is breaking.

DO / DON’T

DO:

DON’T:

The Six Phases

NIST SP 800-61 Rev. 2 defines the incident response lifecycle. This is the authoritative framework, and it breaks into six phases.

Phase 1: Preparation

Preparation is everything you do before an incident occurs. It’s the most important phase because it determines how effective every other phase will be.

Team structure:

Preparation checklist:

Phase 2: Detection and Analysis

Something triggered the alarm. Now you need to determine if it’s a real incident, how bad it is, and what’s affected.

Initial triage:

Severity levels:

Severity Definition Response
SEV-1 (Critical) Active data exfiltration, ransomware spreading, critical infrastructure compromised All hands, IC on scene, executive notification, consider external IR support
SEV-2 (High) Confirmed compromise of production systems, credential theft, malware on multiple systems IR team activated, IC assigned, hourly updates to leadership
SEV-3 (Medium) Suspicious activity confirmed, single system compromised, phishing with credential harvest IR team investigating, IC monitoring, daily updates
SEV-4 (Low) Unsuccessful attack, policy violation, suspicious but unconfirmed activity Analyst investigation, document and monitor

Analysis:

Phase 3: Containment

Stop the bleeding without destroying evidence.

Short-term containment (minutes to hours):

Long-term containment (hours to days):

Evidence preservation during containment:

Phase 4: Eradication

Remove the attacker’s presence entirely.

Phase 5: Recovery

Bring systems back to normal operations with confidence that the threat is eliminated.

Phase 6: Lessons Learned

The most skipped phase and the most valuable one.

Conduct a post-incident review (blameless postmortem) within two weeks of incident closure. Include all parties who participated in the response.

Questions to answer:

Document the findings. Update the IR plan. Implement the improvements. If the lessons learned review doesn’t result in changes, you didn’t learn anything — you just held a meeting.

Communication Plan

Internal Communication

External Communication

Pre-draft notification templates for each audience. During an incident, you’ll fill in specifics — not write from scratch.

Tabletop Exercises

A tabletop exercise walks the IR team through a simulated incident scenario without touching real systems. It’s a discussion-based exercise that tests decision-making, communication, and plan completeness.

How to run one:

  1. Define a realistic scenario relevant to your organization (ransomware, data breach, insider threat, supply chain compromise)
  2. Assign roles — participants play their real IR roles
  3. Present the scenario in stages (inject new information every 15-20 minutes)
  4. At each stage, ask: What do we do? Who do we call? What information do we need?
  5. Document gaps, disagreements, and unclear responsibilities
  6. Conduct a debrief immediately after

Run tabletops at least annually. Quarterly is better. Vary the scenarios. Include executives in at least one per year — they need to practice their decision-making too. CISA provides tabletop exercise packages (CTEPs) that you can use as starting points.


The incident response plan is your playbook for the worst day. Write it now. Assign roles. Draft communication templates. Run a tabletop exercise. Then put the plan somewhere you can reach it when your network is on fire — printed, offline, and in the hands of everyone who needs it. The first hour of an incident determines the outcome. Make sure your team knows what to do before the clock starts.