Incident Response Plan Template: Free Download Guide 2026
Posted: March 27, 2026 to Cybersecurity.
Why Every Organization Needs an Incident Response Plan
A cybersecurity incident is not a question of if but when. The IBM 2025 Cost of a Data Breach Report found that organizations with a tested incident response plan and team saved an average of $2.66 million per breach compared to those without one. Despite this, fewer than half of small and mid-size businesses have a documented, rehearsed plan in place.
An incident response (IR) plan is a structured set of instructions that guide your team through detecting, containing, eradicating, and recovering from security incidents. Without one, teams waste critical hours figuring out who does what, which systems to isolate, who to notify, and how to preserve evidence. Those lost hours translate directly into greater data loss, longer downtime, and higher recovery costs.
The National Institute of Standards and Technology (NIST SP 800-61 Rev. 2) provides the foundational framework for incident response. This guide walks you through every component of an effective IR plan and gives you a practical template you can adapt to your organization.
Core Components of an Incident Response Plan
An effective IR plan contains six major sections. Each one addresses a different phase of incident management, from preparation through post-incident improvement.
1. Preparation
Preparation is everything that happens before an incident occurs. This is where most of the value of an IR plan lives, because a well-prepared team responds faster and with fewer mistakes.
Your preparation section should document:
- Incident response team roster: Names, roles, contact information (primary and backup), and escalation order
- Communication channels: Primary and backup communication methods (not dependent on compromised systems)
- Tool inventory: Forensic tools, network isolation switches, backup systems, and out-of-band management access
- Asset inventory: Critical systems ranked by business impact, with network locations and responsible owners
- Baseline documentation: Normal network traffic patterns, expected processes, and approved software lists
- Legal and regulatory contacts: Outside counsel, insurance carrier, regulatory notification contacts
- Training schedule: Tabletop exercises, technical drills, and awareness training cadence
2. Detection and Analysis
Detection defines how your organization identifies that an incident is occurring. Analysis determines the scope, severity, and nature of the incident.
Document your detection sources:
- SIEM alerts and correlation rules
- Endpoint detection and response (EDR) notifications
- Network intrusion detection system (NIDS) alerts
- User reports of suspicious activity
- Threat intelligence feeds and dark web monitoring
- Cloud security posture management (CSPM) findings
- Email security gateway alerts (phishing, malware attachments)
Your analysis framework should classify incidents by severity level:
| Severity | Description | Response Time | Example |
|---|---|---|---|
| Critical (P1) | Active breach with data exfiltration or system destruction | Immediate (within 15 minutes) | Ransomware spreading across network |
| High (P2) | Confirmed compromise with potential for data loss | Within 1 hour | Compromised admin account |
| Medium (P3) | Suspicious activity requiring investigation | Within 4 hours | Unusual outbound traffic pattern |
| Low (P4) | Policy violation or minor security event | Within 24 hours | Unauthorized software installation |
3. Containment
Containment stops the incident from spreading while preserving evidence for forensic analysis. There are two containment strategies to document.
Short-term containment focuses on immediate actions to limit damage:
- Isolating affected systems from the network (VLAN change, firewall block, physical disconnect)
- Disabling compromised user accounts
- Blocking malicious IP addresses, domains, or file hashes
- Redirecting DNS to prevent command-and-control communication
Long-term containment prepares for eradication while maintaining business operations:
- Deploying temporary fixes or workarounds on affected systems
- Setting up clean parallel systems to replace compromised ones
- Increasing monitoring on unaffected systems to detect lateral movement
- Preserving forensic images of affected systems before any changes
4. Eradication
Eradication removes the root cause of the incident from your environment. This goes beyond deleting malware. It means eliminating the attacker's access, closing the vulnerability they exploited, and verifying that no persistence mechanisms remain.
Eradication activities include:
- Removing malware, backdoors, and unauthorized accounts from all affected systems
- Patching the vulnerability or misconfiguration that enabled initial access
- Resetting credentials for all potentially compromised accounts
- Rebuilding severely compromised systems from known-good images
- Scanning the entire environment for indicators of compromise (IOCs) discovered during analysis
- Updating security tools with new signatures and detection rules
5. Recovery
Recovery brings affected systems back to normal operation. This phase requires careful validation to confirm that systems are clean and functioning correctly before restoring full access.
Recovery steps:
- Restore systems from verified clean backups or rebuild from scratch
- Validate system integrity using file integrity monitoring and configuration baselines
- Reconnect systems to the network in a controlled, monitored manner
- Conduct thorough testing of application functionality
- Monitor recovered systems intensively for at least 30 days for signs of re-compromise
- Gradually restore normal access levels as confidence in system integrity grows
6. Post-Incident Activity
The post-incident review is where your organization turns a painful experience into lasting improvement. Schedule a formal lessons-learned meeting within two weeks of incident closure.
The review should document:
- Complete timeline from initial detection to full recovery
- What worked well in the response (preserve these practices)
- What failed or was missing (these become action items)
- Root cause analysis identifying how the attacker gained initial access
- Specific, measurable improvements to prevent similar incidents
- Updates to the IR plan based on lessons learned
- Cost accounting for the incident (labor, downtime, legal, notification, remediation)
Need Help with Incident Response Planning?
Petronella Technology Group builds and tests incident response plans for organizations that need to be ready when a breach occurs. Schedule a free consultation or call 919-348-4912.
Building Your IR Team
An incident response team needs clearly defined roles with primary and backup assignments. At minimum, your team should include:
- Incident Commander: Senior leader who owns the response, makes containment decisions, and manages communications. Typically a CISO, IT Director, or VP of Engineering.
- Technical Lead: Senior engineer or security analyst who directs technical investigation and remediation. Makes hands-on decisions about system isolation, forensic imaging, and recovery procedures.
- Communications Lead: Manages internal and external communications including employee notifications, customer communications, media inquiries, and regulatory notifications.
- Legal Counsel: Advises on regulatory notification requirements, evidence preservation, privilege considerations, and liability exposure. Can be in-house or outside counsel.
- Business Liaison: Represents affected business units, communicates impact to stakeholders, and helps prioritize recovery of business-critical systems.
Incident Response Plan Template Structure
A practical IR plan template follows this document structure. Adapt each section to your organization's specific environment, regulatory requirements, and risk profile.
- Document Control: Version, approval, review schedule, distribution list
- Purpose and Scope: What the plan covers, which systems and locations, regulatory drivers
- Roles and Responsibilities: Team roster with contact information and escalation paths
- Incident Classification: Severity levels, categories (malware, unauthorized access, data breach, DoS, insider threat)
- Detection Procedures: Alert sources, triage process, initial assessment checklist
- Containment Procedures: Short-term and long-term containment actions by incident type
- Eradication Procedures: Root cause removal, system hardening, credential reset
- Recovery Procedures: Restoration from backup, validation testing, phased reconnection
- Communication Plan: Internal notifications, customer notification templates, regulatory notification requirements and timelines
- Evidence Preservation: Chain of custody procedures, forensic imaging, log retention
- Regulatory Notification Matrix: Requirements by regulation (HIPAA 60-day, state breach notification laws, PCI DSS, CMMC)
- Post-Incident Review: Lessons-learned meeting agenda, report template, improvement tracking
- Appendices: Contact lists, network diagrams, vendor contracts, insurance policy details
Testing Your Incident Response Plan
An untested plan is a plan that will fail when you need it most. NIST recommends regular testing through multiple methods.
Tabletop Exercises
Gather your IR team in a conference room and walk through a realistic scenario verbally. The facilitator introduces events gradually, and participants describe what actions they would take. Tabletop exercises are low-cost, low-risk, and excellent for identifying gaps in communication, decision-making, and procedure documentation. Run these quarterly.
Functional Exercises
A step up from tabletops, functional exercises involve actually performing some response actions in a controlled environment. This might include isolating a test system, running forensic tools on a prepared image, or drafting notification letters under time pressure. These validate that your team can execute procedures, not just discuss them.
Full-Scale Simulations
The most rigorous test involves a red team or purple team exercise where attackers simulate a real compromise and your IR team responds in real time. This tests every aspect of your plan including detection, containment, communication, and recovery. Run full-scale simulations annually at minimum.
Regulatory Requirements for Incident Response
Multiple regulatory frameworks mandate incident response capabilities. Your plan must satisfy all applicable requirements.
| Framework | IR Requirement | Notification Timeline |
|---|---|---|
| HIPAA | Written IR procedures required under Security Rule | 60 days from discovery of breach |
| PCI DSS v4.0 | IR plan required under Requirement 12.10 | Immediately to card brands, varies by brand |
| CMMC Level 2 | IR capability required under IR domain (NIST 800-171) | 72 hours to DoD for cyber incidents |
| NIST CSF 2.0 | Respond function with 6 categories | Varies by sector-specific regulation |
| SOC 2 | IR procedures required for Trust Services Criteria | As defined in service commitments |
| State Breach Laws | Varies by state (all 50 states have laws) | 30 to 90 days depending on state |