Olay Müdahale Planı Şablonu: Hazırlayın, Tespit Edin, Yanıtlayın, Kurtarın

Hazırlık, tespit, kontrol altına alma, ortadan kaldırma, kurtarma ve olay sonrası incelemeyi kapsayan eksiksiz şablonumuzla bir olay müdahale planı oluşturun.

E
ECOSIRE Research and Development Team
|16 Mart 20268 dk okuma1.7k Kelime|

Bu makale şu anda yalnızca İngilizce olarak mevcuttur. Çeviri yakında eklenecektir.

{series} serimizin bir parçası

Tam kılavuzu okuyun

Incident Response Plan Template: Prepare, Detect, Respond, Recover

IBM's Cost of a Data Breach Report reveals that organizations with incident response plans and teams reduce breach costs by an average of $2.66 million and identify breaches 54 days faster than those without. Yet 77 percent of organizations do not have a consistently applied incident response plan.

An incident response (IR) plan is not a document that sits on a shelf. It is a playbook that your team knows, has practiced, and can execute under pressure. This guide provides a complete, customizable IR plan template following the NIST framework.


Part 1: Plan Overview

Purpose

This Incident Response Plan establishes procedures for detecting, responding to, containing, and recovering from cybersecurity incidents. It ensures a coordinated, efficient response that minimizes damage and recovery time.

Scope

This plan covers all information systems, networks, data, and users within the organization, including:

  • On-premise and cloud infrastructure
  • Employee and contractor devices
  • Third-party systems processing organizational data
  • Physical security incidents affecting IT assets

Incident Classification

SeverityDefinitionExamplesResponse Time
Critical (P1)Active data breach, ransomware, system-wide outageData exfiltration, encryption of systems, DDoSImmediate (within 15 minutes)
High (P2)Confirmed compromise, significant disruptionCompromised admin account, malware spread, targeted attackWithin 1 hour
Medium (P3)Suspicious activity, limited impactPhishing attempt, unauthorized access attempt, policy violationWithin 4 hours
Low (P4)Minor security event, no immediate threatFailed login attempts, policy warnings, scan activityWithin 24 hours

Part 2: Roles and Responsibilities

Incident Response Team

RoleResponsibilityPrimary ContactBackup Contact
Incident CommanderOverall coordination, decision authority[Name, Phone, Email][Name, Phone, Email]
Technical LeadTechnical investigation and containment[Name, Phone, Email][Name, Phone, Email]
Communications LeadInternal and external communications[Name, Phone, Email][Name, Phone, Email]
Legal CounselRegulatory obligations, legal guidance[Name, Phone, Email][Name, Phone, Email]
Business LiaisonBusiness impact assessment, stakeholder updates[Name, Phone, Email][Name, Phone, Email]
Executive SponsorEscalation authority, resource allocation[Name, Phone, Email][Name, Phone, Email]

RACI Matrix

ActivityCommanderTech LeadCommsLegalBusinessExecutive
Initial triageARIIII
Containment decisionsARICCI
Technical investigationIA/RIIII
Internal communicationICA/RCRI
External communicationACRRCA
Recovery decisionsARICRA
Post-incident reviewARRRRI

R = Responsible, A = Accountable, C = Consulted, I = Informed


Part 3: The Six Phases of Incident Response

Phase 1: Preparation

Preparation happens before any incident occurs.

Technical preparation:

  • Security monitoring tools deployed and configured (SIEM, EDR, IDS/IPS)
  • Log collection from all critical systems centralized
  • Backup systems tested (restore verified within the last 30 days)
  • Network diagrams current and accessible offline
  • Asset inventory current (all systems, applications, data stores)
  • Forensic toolkit assembled (imaging tools, write blockers, chain of custody forms)

Organizational preparation:

  • IR team members identified and trained
  • Contact list current (including after-hours and weekend numbers)
  • Communication templates drafted (customer, regulator, media, employee)
  • Legal obligations documented (notification requirements by jurisdiction)
  • Tabletop exercise conducted within the last 6 months
  • Third-party IR retainer in place (forensics firm, legal firm)
  • Cyber insurance policy reviewed and current

Phase 2: Detection and Analysis

Detection sources:

SourceType of AlertPriority
SIEMCorrelated events, anomaly detectionHigh
EDRMalware detection, suspicious behaviorHigh
User reportPhishing, suspicious email, unusual behaviorMedium
Third-party notificationVendor, partner, or researcher reports compromiseHigh
Dark web monitoringCredentials or data found on dark webHigh
Automated scanningVulnerability discovered, misconfigurationMedium

Initial triage questions:

  1. What happened? (What was detected, by whom, when?)
  2. What systems are affected? (Scope assessment)
  3. Is the incident still active? (Ongoing vs. historical)
  4. What data may be at risk? (Classification level)
  5. What is the business impact? (Operational disruption)
  6. Does this trigger any regulatory notification requirements?

Documentation from the first minute:

Incident ID: INC-[YEAR]-[SEQUENTIAL]
Date/Time Detected: [YYYY-MM-DD HH:MM UTC]
Detected By: [Person/System]
Detection Method: [Alert/Report/Discovery]
Initial Classification: [P1/P2/P3/P4]
Affected Systems: [List]
Initial Description: [What is known]
Assigned To: [Incident Commander]

Phase 3: Containment

Short-term containment (stop the bleeding):

ActionWhen to UseRisk
Isolate affected systems from networkActive data exfiltrationDisrupts business operations
Disable compromised user accountsCredential compromise confirmedUser cannot work until resolved
Block malicious IP addresses/domainsKnown C2 communicationMay block legitimate traffic
Revoke compromised API keys/tokensAPI credential leakedIntegration disruption
Enable additional loggingNeed more visibilityPerformance impact (minimal)

Long-term containment (while investigating):

ActionPurpose
Apply temporary security patchesClose the exploited vulnerability
Increase monitoring on affected segmentsDetect any continued malicious activity
Implement additional access controlsPrevent reuse of attack vector
Set up clean systems for critical operationsMaintain business continuity

Containment decision matrix:

SituationContain AggressivelyContain Cautiously
Active data theftImmediately isolate--
Ransomware spreadingImmediately isolate--
Compromised admin accountDisable immediately--
Suspicious but unconfirmed--Monitor first, then contain
Historical compromise (no active threat)--Plan containment carefully

Phase 4: Eradication

Remove the root cause of the incident.

Eradication checklist:

  • Identify and remove all malware/backdoors
  • Patch the vulnerability that was exploited
  • Reset all compromised credentials (passwords, API keys, certificates)
  • Review and harden configurations on affected systems
  • Scan all systems for indicators of compromise (IoCs)
  • Verify that attacker persistence mechanisms are removed
  • Review logs to confirm no other systems were compromised

Phase 5: Recovery

Restore systems and operations to normal.

Recovery process:

  1. Verify eradication is complete (rescan, review logs)
  2. Restore systems from clean backups (if needed)
  3. Validate system integrity before returning to production
  4. Monitor recovered systems with heightened alerting for 30 days
  5. Gradually restore normal operations (critical systems first)
  6. Verify data integrity (compare to backups, check for modifications)
  7. Confirm business operations are functioning normally

Phase 6: Post-Incident Review

Conduct within 5 business days of incident closure.

Review agenda:

  1. Timeline reconstruction --- What happened, when, and in what sequence?
  2. Detection effectiveness --- How was the incident detected? Could it have been detected earlier?
  3. Response effectiveness --- What went well? What did not?
  4. Root cause analysis --- What was the underlying cause? (Not just the technical vulnerability, but the process/policy gap)
  5. Lessons learned --- What will we change as a result?
  6. Action items --- Specific improvements with owners and deadlines

Part 4: Communication Templates

Internal Communication (Employee Notification)

Subject: Security Incident Update - [Date]

Team,

We have identified a security incident affecting [brief description].

What we know:
- [Factual summary of the situation]
- [Systems/data potentially affected]

What we are doing:
- [Response actions taken]
- [Timeline for resolution]

What you should do:
- [Specific employee actions, e.g., change passwords]
- [Who to contact with questions]

We will provide updates every [frequency].

[Incident Commander Name]

Customer Notification (if required)

Subject: Important Security Notice from [Company]

Dear [Customer],

We are writing to inform you of a security incident that may have
affected your data. We take the security of your information seriously
and want to be transparent about what occurred.

What happened: [Brief, factual description]
When: [Date range of the incident]
What information was involved: [Specific data types]
What we have done: [Response and remediation actions]
What you can do: [Recommended customer actions]

For questions, contact our dedicated response team at [contact info].

[Executive Name and Title]

Part 5: Testing the Plan

Tabletop Exercise Template

Scenario: "An employee clicks a link in a phishing email. Two hours later, the security team detects encrypted traffic to an unknown external IP from the employee's workstation."

Discussion questions at each phase:

  1. Who is notified first? How?
  2. What severity is this classified as?
  3. What containment actions do we take immediately?
  4. What evidence do we preserve?
  5. Who communicates to the broader organization?
  6. When do we involve legal counsel?
  7. Does this trigger regulatory notification?

Conduct tabletop exercises quarterly. Full simulation exercises annually.



An incident response plan is your organization's insurance policy against the inevitable. When a breach occurs, the difference between a controlled response and chaos is preparation. Contact ECOSIRE for incident response planning and security assessment services.

E

Yazan

ECOSIRE Research and Development Team

ECOSIRE'da kurumsal düzeyde dijital ürünler geliştiriyor. Odoo entegrasyonları, e-ticaret otomasyonu ve yapay zeka destekli iş çözümleri hakkında içgörüler paylaşıyor.

{series} serisinden daha fazlası

Denetim Hazırlığı Kontrol Listesi: ERP'niz Denetimleri Nasıl Yüzde 60 Daha Hızlı Hale Getirir?

ERP sistemlerini kullanarak denetim hazırlığı kontrol listesini tamamlayın. Uygun dokümantasyon, kontroller ve otomatik kanıt toplama ile denetim süresini yüzde 60 azaltın.

Çerez Onayı Uygulama Kılavuzu: Yasal Uyumlu Rıza Yönetimi

GDPR, eGizlilik, CCPA ve küresel düzenlemelere uygun çerez iznini uygulayın. İzin banner'larını, çerez kategorizasyonunu ve CMP entegrasyonunu kapsar.

Sınır Ötesi Veri Aktarımı Düzenlemeleri: Uluslararası Veri Akışlarında Gezinme

SCC'ler, yeterlilik kararları, BCR'ler ve GDPR, Birleşik Krallık ve APAC uyumluluğuna yönelik aktarım etki değerlendirmeleriyle sınır ötesi veri aktarımı düzenlemelerinde gezinin.

Bölgelere Göre Siber Güvenlik Düzenleme Gereksinimleri: Küresel İşletmeler için Bir Uyumluluk Haritası

ABD, AB, Birleşik Krallık, APAC ve Orta Doğu'daki siber güvenlik düzenlemelerinde gezinin. NIS2, DORA, SEC kurallarını, kritik altyapı gereksinimlerini ve uyumluluk zaman çizelgelerini kapsar.

Veri Yönetişimi ve Uyumluluğu: Teknoloji Şirketleri İçin Tam Kılavuz

Teknoloji şirketlerine yönelik uyumluluk çerçevelerini, veri sınıflandırmasını, saklama politikalarını, gizlilik düzenlemelerini ve uygulama yol haritalarını kapsayan eksiksiz veri yönetimi kılavuzu.

Veri Saklama Politikaları ve Otomasyon: İhtiyacınız Olanı Tutun, İhtiyacınız Olanı Silin

GDPR, SOX ve HIPAA için yasal gereklilikler, saklama programları, otomatik uygulama ve uyumluluk doğrulamasıyla veri saklama politikaları oluşturun.

WhatsApp'ta Sohbet Et