Building an Incident Response Plan: The Template and Process That Actually Works Under Pressure | Lorikeet Security Skip to main content
Back to Blog

Building an Incident Response Plan: The Template and Process That Actually Works Under Pressure

Lorikeet Security Team April 7, 2026 11 min read

TL;DR: The incident response plans that fail under pressure are the ones written for auditors — 40-page documents that no one has read, with vague role descriptions and no actionable procedures. The plans that work are concise, role-specific, and rehearsed. They define severity levels with unambiguous criteria, assign responsibilities through a RACI matrix, include pre-written communication templates, establish clear escalation triggers, and get tested through tabletop exercises at least twice a year. An IR plan that has never been exercised is a plan that will fail when activated.

Incident Response Frameworks Compared

Framework Phases Best For Regulatory Alignment
NIST 800-61 Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident General-purpose, US government alignment FedRAMP, FISMA, SOC 2, HIPAA
SANS 6-Step Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned Technical teams, more granular phases Industry best practice, vendor-neutral
ISO 27035 Plan & Prepare, Detection & Reporting, Assessment & Decision, Responses, Lessons Learned ISO 27001 certified organizations ISO 27001, GDPR, international compliance
CISA Incident Response Asset identification, Protect, Detect, Respond, Recover Critical infrastructure, public sector CISA requirements, federal reporting

Phase 1: Preparation — Before the Incident

Preparation is the phase that determines whether everything else works. An organization that has invested in preparation responds to incidents in hours; one that has not responds in weeks — if it detects the incident at all. Preparation is not just writing the plan document. It includes establishing the IR team and communication channels, deploying detection and logging capabilities, building relationships with external resources (legal counsel, forensics firms, law enforcement contacts), and rehearsing the plan through exercises.

The IR Team and RACI Matrix

Every incident response plan must define who is involved and what their specific responsibilities are. A RACI matrix eliminates ambiguity during high-stress situations by assigning four roles for each IR activity:

The RACI must include roles from outside the security team: legal, communications/PR, customer support, human resources (for insider threat incidents), and executive leadership. Incidents that escalate beyond severity level 2 invariably involve non-technical stakeholders, and discovering who should be in the room during an active incident is a preparation failure.


Phase 2: Severity Classification

Severity classification determines what resources are activated, what communication cadence is followed, and what escalation timelines apply. Ambiguous severity criteria are the most common failure point in IR plans — responders waste critical time debating whether an event is a "Level 2" or "Level 3" instead of executing the plan.

Define severity levels with objective, measurable criteria:


Phase 3: Communication Templates

During an active incident, writing communications from scratch consumes time and introduces risk — a poorly worded customer notification or a premature public statement can cause more damage than the incident itself. Pre-written templates for every communication type eliminate this pressure.

The communication templates your IR plan needs include:


Phase 4: Escalation Procedures

Escalation procedures define the criteria for increasing incident severity and engaging additional resources. These must be specific enough that an on-call engineer at 3 AM can make the escalation decision without waiting for a manager's approval. Time-based escalation triggers are critical: if a SEV-3 investigation has not determined root cause within 4 hours, it automatically escalates to SEV-2 and the full IR team is activated.

External escalation triggers should also be predefined: when to engage outside forensics firms (any SEV-1, or any SEV-2 involving potential data exfiltration), when to notify law enforcement (confirmed criminal activity, ransomware with ransom demand), when to activate cyber insurance (any incident that may result in a claim), and when to engage legal counsel (any incident involving regulated data or potential litigation exposure).


Evidence Preservation

Evidence preservation is where technical execution intersects with legal requirements. Digital evidence that is not properly preserved — with documented chain of custody, forensic imaging before remediation, and tamper-evident storage — may be inadmissible in legal proceedings and insufficient for regulatory investigations.

The IR plan should include specific evidence preservation procedures: image affected systems before wiping or rebuilding them, preserve logs from the earliest available timestamp (SIEM, cloud audit logs, application logs, network flow data), document the timeline of discovery and response actions with timestamps, and photograph or record physical evidence if relevant. Store forensic images on write-once media or in tamper-evident cloud storage with restricted access.

Critical detail: Ensure log retention policies are sufficient before an incident occurs. If your SIEM retains logs for 30 days and the attacker has been in the environment for 60 days, you have lost half the investigation timeline. Set log retention to at least 90 days for security-relevant logs, and 365 days for authentication and access logs.


Post-Incident Review

The post-incident review (also called a retrospective or lessons-learned meeting) is the mechanism that converts incidents into security improvements. Every incident at SEV-3 or above should have a formal review within two weeks of resolution. The review should be blameless — focused on process failures, detection gaps, and response improvements rather than individual performance.

Structure the review around five questions: What happened (factual timeline)? How did we detect it (and how could we have detected it sooner)? What went well in the response? What did not go well? What specific changes will we make to prevent recurrence or improve response? Document the answers and assign action items with owners and deadlines. Track these action items to completion — a post-incident review that generates recommendations no one implements is theater.


Tabletop Exercise Design

A tabletop exercise is a discussion-based simulation of an incident scenario. The facilitator presents an evolving scenario, and the participants walk through their response decisions using the IR plan. Tabletop exercises validate that the plan is understood, identify gaps in procedures or role assignments, and build the decision-making muscle memory that responders need during real incidents.

Effective tabletop exercises share several characteristics: they use realistic scenarios based on current threat intelligence (not hypothetical attacks that would never target your organization), they include participants from all relevant functions (not just security), they introduce complications as the scenario progresses (the backup system is also compromised, the media calls, a key responder is unavailable), and they end with a structured debrief that captures findings and action items.

Run at least two tabletop exercises per year with different scenarios. Rotate participants to ensure broad organizational preparedness. Document each exercise and the improvements it identified. Auditors for SOC 2, ISO 27001, and other frameworks increasingly expect evidence of regular tabletop exercises as part of incident response program maturity.

For help building, testing, and refining your incident response plan — including facilitated tabletop exercises with realistic attack scenarios — contact Lorikeet Security. Our team designs IR programs that are built for actual incidents, not just auditor review.

Build an IR Plan That Works Under Pressure

Lorikeet Security helps organizations build, test, and refine incident response plans through tabletop exercises, IR program assessments, and hands-on coaching. We design plans that your team can actually execute when it matters.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!