Incident Response SOP
Standard Operating Procedure for incident response planning and execution
Service Pillar: Protect
Service Category: Incident Response
Target Duration: Varies by engagement type
Related Pricing: See Pricing & Positioning
Service Overview
Purpose
Provide incident response planning, testing, and execution services to help organizations prepare for, detect, contain, and recover from security incidents.
Service Types
| Service |
Description |
Engagement Type |
| IR Plan Development |
Create comprehensive IR plan |
Project-based |
| IR Plan Review |
Assess existing IR capabilities |
Assessment |
| Tabletop Exercise |
Scenario-based IR testing |
Workshop |
| IR Retainer |
On-call incident response |
Retainer |
| Active IR |
Respond to live incident |
Emergency |
Target Personas
Business Justification
Pricing Reference
| Service |
Scope |
Price Range |
Duration |
| IR Plan Development |
Full plan creation |
$15,000-$30,000 |
4-6 weeks |
| IR Plan Review |
Assessment of existing plan |
$5,000-$10,000 |
1-2 weeks |
| Tabletop Exercise |
Single scenario exercise |
$5,000-$10,000 |
Half-day session |
| IR Retainer |
On-call availability |
$3,000-$8,000/month |
Monthly retainer |
| Active IR |
Live incident response |
$300-$400/hour |
As needed |
See Pricing & Positioning for complete pricing structure.
IR Plan Development
Pre-Engagement
Qualification Checklist
| Category |
Information Needed |
| Organizational |
Org chart, contact information, escalation paths |
| Technical |
Asset inventory, network diagrams, logging capabilities |
| Regulatory |
Compliance requirements, notification timelines |
| Legal |
Outside counsel, privilege considerations |
| Insurance |
Cyber liability policy, carrier contacts |
| Vendors |
Forensics, PR, notification services |
Plan Components
Core Plan Sections
| Section |
Content |
Purpose |
| Purpose and Scope |
Plan objectives, applicability |
Define boundaries |
| Roles and Responsibilities |
IR team structure, RACI |
Accountability |
| Incident Classification |
Severity levels, criteria |
Appropriate response |
| Response Phases |
Preparation through post-incident |
Structured process |
| Communication Plan |
Internal/external communication |
Coordinated messaging |
| Regulatory Requirements |
Notification timelines, requirements |
Compliance |
| Contact Lists |
Internal and external contacts |
Quick access |
| Playbooks |
Scenario-specific procedures |
Tactical guidance |
Incident Classification
| Severity |
Definition |
Response Time |
Escalation |
| Critical |
Active data breach, ransomware, business impact |
Immediate |
Executive, Legal, Board |
| High |
Compromised systems, potential data exposure |
4 hours |
CISO, IT Leadership |
| Medium |
Contained malware, suspicious activity |
24 hours |
Security Team |
| Low |
Policy violations, minor security events |
72 hours |
IT Support |
Response Phase Framework (NIST)
┌─────────────┐ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐ ┌─────────────┐
│ PREPARATION │ → │ DETECTION & │ → │ CONTAINMENT │ → │ ERADICATION │ → │ RECOVERY │
│ │ │ ANALYSIS │ │ │ │ │ │ │
└─────────────┘ └─────────────┘ └─────────────┘ └─────────────┘ └─────────────┘
↓
┌─────────────────┐
│ POST-INCIDENT │
│ ACTIVITY │
└─────────────────┘
Plan Development Process
Phase 1: Assessment (Week 1-2)
| Activity |
Deliverable |
Duration |
| Stakeholder interviews |
Current state understanding |
3 days |
| Documentation review |
Gap identification |
2 days |
| Regulatory analysis |
Compliance requirements |
1 day |
| Threat assessment |
Relevant scenarios |
2 days |
Phase 2: Plan Development (Week 2-4)
| Activity |
Deliverable |
Duration |
| Core plan drafting |
IR Plan document |
5 days |
| Communication plan |
Messaging templates |
2 days |
| Playbook development |
Scenario playbooks |
3 days |
| Contact list compilation |
Contact directory |
1 day |
Phase 3: Review and Finalization (Week 4-6)
| Activity |
Deliverable |
Duration |
| Legal review |
Privileged document structure |
3 days |
| Stakeholder review |
Feedback incorporation |
3 days |
| Final documentation |
Complete IR plan |
2 days |
| Training session |
Team enablement |
0.5 day |
Scenario Playbooks
Standard Playbooks Included
| Scenario |
Key Actions |
Regulatory Considerations |
| Ransomware |
Isolation, decision tree, negotiation guidance |
Law enforcement notification |
| Data Breach |
Scope determination, notification assessment |
HIPAA, CCPA, state laws |
| Business Email Compromise |
Account remediation, wire fraud response |
Financial notification |
| Insider Threat |
HR coordination, evidence preservation |
Employment law |
| DDoS Attack |
Mitigation, service restoration |
Customer communication |
| Malware Infection |
Containment, cleanup, recovery |
Varies by data exposure |
Playbook Structure
## [Scenario Name] Playbook
### Indicators
- [Signs of this incident type]
### Initial Response (First 30 minutes)
1. [Immediate actions]
2. [Escalation triggers]
3. [Initial containment]
### Investigation
1. [Evidence collection]
2. [Scope determination]
3. [Root cause analysis]
### Containment & Eradication
1. [Containment actions]
2. [Removal procedures]
3. [Validation steps]
### Recovery
1. [System restoration]
2. [Verification steps]
3. [Monitoring requirements]
### Post-Incident
1. [Documentation requirements]
2. [Notification decisions]
3. [Lessons learned]
### Contacts
- [Scenario-specific contacts]
Tabletop Exercise
Exercise Design
Scenario Development
| Element |
Description |
| Realistic scenario |
Based on likely threats for client industry |
| Injects |
Evolving situation updates during exercise |
| Decision points |
Require participant choices |
| Complexity |
Appropriate for team maturity |
Standard Scenarios
| Scenario |
Suitable For |
Duration |
| Ransomware attack |
All organizations |
2-3 hours |
| Data breach notification |
Healthcare, financial |
2-3 hours |
| Business email compromise |
Finance teams |
1.5-2 hours |
| Third-party compromise |
Organizations with vendors |
2-3 hours |
| Insider threat |
Larger organizations |
2-3 hours |
Exercise Execution
Participants
| Role |
Purpose |
| Executive sponsor |
Final decision authority |
| IT/Security leadership |
Technical response |
| Legal counsel |
Legal/regulatory guidance |
| Communications/PR |
Messaging coordination |
| HR |
Employee-related issues |
| Business unit leaders |
Operational impact |
| Facilitator (SBK) |
Exercise management |
Agenda
| Phase |
Duration |
Activity |
| Introduction |
15 min |
Objectives, ground rules, scenario overview |
| Exercise |
90-120 min |
Scenario presentation, discussion, decisions |
| Inject responses |
Included |
Evolving situation management |
| Debrief |
30 min |
Immediate observations, key learnings |
| After-action |
Post-exercise |
Formal findings and recommendations |
Exercise Deliverables
| Deliverable |
Content |
| Exercise report |
Scenario, observations, recommendations |
| Gap analysis |
Identified weaknesses |
| Action items |
Prioritized improvements |
| Updated plan |
Revisions based on findings |
IR Retainer
Retainer Services
| Tier |
Monthly Fee |
Response Time |
Included Hours |
| Bronze |
$3,000 |
8 hours |
5 hours/month |
| Silver |
$5,000 |
4 hours |
10 hours/month |
| Gold |
$8,000 |
2 hours |
20 hours/month |
Retainer Benefits
| Benefit |
Description |
| Guaranteed response |
SLA-backed response times |
| Relationship |
Pre-established team familiarity |
| Planning hours |
Quarterly plan review/update |
| Reduced rates |
Discounted active IR rates |
| Priority access |
Jump the queue during incidents |
Retainer Activation
| Step |
Action |
Timeline |
| 1 |
Client contacts SBK hotline |
T+0 |
| 2 |
Initial triage call |
Within SLA |
| 3 |
Response scope determination |
T+1 hour |
| 4 |
Response team deployment |
Per severity |
Active Incident Response
Emergency Response Process
Initial Notification
| Information Needed |
Purpose |
| Incident description |
Understanding situation |
| Business impact |
Severity determination |
| Actions taken |
Current state |
| Key contacts |
Communication |
| Environment info |
Response planning |
Response Phases
Phase 1: Triage (First 2-4 hours)
| Activity |
Deliverable |
| Situation assessment |
Incident classification |
| Scope determination |
Affected systems/data |
| Containment decisions |
Immediate actions |
| Resource planning |
Response team needs |
Phase 2: Investigation (Hours 4-48)
| Activity |
Deliverable |
| Evidence collection |
Forensic images, logs |
| Threat analysis |
Attack vector, IOCs |
| Scope refinement |
Complete impact assessment |
| Legal coordination |
Privilege establishment |
Phase 3: Containment (Concurrent)
| Activity |
Deliverable |
| Threat isolation |
Contained environment |
| Credential remediation |
Secure access |
| Network segmentation |
Limited spread |
| Monitoring enhancement |
Detection of spread |
Phase 4: Eradication
| Activity |
Deliverable |
| Malware removal |
Clean systems |
| Vulnerability remediation |
Attack vector closure |
| Backdoor elimination |
Persistence removal |
| Validation |
Confirmed clean |
Phase 5: Recovery
| Activity |
Deliverable |
| System restoration |
Operational systems |
| Data recovery |
Restored data |
| Monitoring |
Enhanced detection |
| Validation |
Confirmed stability |
Phase 6: Post-Incident
| Activity |
Deliverable |
| Timeline documentation |
Incident chronology |
| Root cause analysis |
Attack understanding |
| Lessons learned |
Improvement opportunities |
| Regulatory assessment |
Notification decisions |
Notification Requirements
Regulatory Notification Matrix
| Framework |
Threshold |
Timeline |
Authority |
| HIPAA |
Unsecured PHI |
60 days (individuals), 60 days (HHS) |
HHS OCR |
| State Breach Laws |
PII exposure |
30-90 days (varies) |
State AG |
| CCPA |
CA resident PII |
Without unreasonable delay |
CA AG |
| GDPR |
EU data subject |
72 hours (DPA) |
Supervisory Authority |
| SEC |
Material breach |
4 business days |
SEC |
| NYDFS |
Cybersecurity event |
72 hours |
NYDFS |
Notification Decision Framework
1. Was there unauthorized access to data?
├── No → Document, monitor, no notification
└── Yes → Continue ↓
2. What data was accessed?
├── No sensitive data → Low risk, document
└── Sensitive data (PII, PHI, financial) → Continue ↓
3. Is harm likely to result?
├── No (encrypted, quickly contained) → Document, risk assessment
└── Yes → Notification likely required ↓
4. Consult legal counsel
└── Determine specific notification requirements
Quality Assurance
IR Plan Review Checklist
Tabletop Exercise Checklist
Evidence Base
Why This Approach Works
| Principle |
Evidence |
Source |
| IR planning reduces costs |
$2.66M average savings |
IBM 2024 |
| Faster detection = lower cost |
23% cost reduction |
IBM 2024 |
| Tested plans perform better |
50% faster containment |
Ponemon Institute |
| Tabletops identify gaps |
60% of orgs find issues |
SANS IR Survey |
SBK Success Metrics
| Metric |
Target |
Measurement |
| Plan completeness |
100% NIST coverage |
Plan review |
| Exercise satisfaction |
4.5+/5.0 |
Participant survey |
| Active IR resolution |
<7 days avg |
Case tracking |
| Client notification compliance |
100% |
Case outcomes |
Regulatory References
Last Updated: February 2026
Version: 1.0