Mako Logics

Resources / Incident Response Plan Template

Cyber Incident Response Plan template.

The written plan you’re supposed to have before something bad happens. A working template small and mid-size Houston businesses can adopt today, tune to their environment, and test once a year.

Published April 21, 2026. Test annually.

This template is a starting point. Cyber-insurance policies, HIPAA, SOC 2, CMMC, and state breach-notification laws all impose specific requirements that may extend or modify what’s below. Customize with your legal counsel and your MSP.

1. Purpose

This Incident Response Plan (“IRP”) defines how [Company Name] detects, contains, recovers from, and documents cyber incidents, with the goal of minimizing business disruption, legal exposure, and customer impact.

2. Scope

This plan applies to all systems, networks, and data owned or used by the company, including cloud services (Microsoft 365, Google Workspace, SaaS), vendor-managed systems, and personally- owned devices accessing company data.

3. Incident classification

  • Low — nuisance events (single phishing email, blocked malware, low-risk policy violation)
  • Medium — contained events (single endpoint compromise, a user who clicked, suspicious login blocked by MFA)
  • High — active or successful compromise (ransomware on one system, credential theft of a privileged account, data exfiltration underway)
  • Critical — business-impacting event (widespread ransomware, confirmed data breach of PII / PHI / CUI, any incident triggering regulatory notification obligations)

4. Roles and responsibilities

  • Incident Response Lead: [Name] — decision authority, communication owner
  • Technical Lead: [MSP or internal IT lead] — owns containment and eradication
  • Legal / Compliance: [Counsel] — owns notification obligations and litigation hold
  • Communications: [Owner or designated spokesperson] — handles client, employee, and regulator communication
  • Cyber-insurance Contact: [Carrier + policy #] — notified within policy's reporting window (often 24-72 hours)

5. The six phases

Phase 1 — Preparation (before anything happens)

  • IR plan written, signed, distributed
  • Annual tabletop exercise documented
  • Contact list (internal + external) up to date
  • Cyber-insurance policy + reporting instructions readily available
  • Backups tested and restore confirmed in the last 90 days

Phase 2 — Detection & triage

  • Source of alert logged (EDR, user report, MSP, external notice)
  • Initial classification assigned
  • Incident ticket opened with timestamp
  • Preliminary scope (what systems / users / data) documented

Phase 3 — Containment

  • Affected systems isolated from the network (not powered off — preserve volatile memory)
  • Compromised accounts disabled, sessions revoked, passwords rotated
  • Firewall / conditional-access rules tightened as needed
  • Communications with the attacker (ransomware notes, extortion emails) preserved, not engaged

Phase 4 — Eradication & recovery

  • Root cause identified and documented
  • Malicious artifacts removed from all affected systems
  • Systems rebuilt from clean backup or known-good images
  • Validation that the attacker no longer has access (credential resets, token revocation, persistence check)
  • Gradual return-to-service with monitoring

Phase 5 — Notification

  • Cyber-insurance carrier notified within policy window
  • Legal / compliance review triggers: HIPAA 60-day clock, state breach-notification laws, client contracts, GLBA, FERPA where applicable
  • Regulator notification if required (HHS, state AG, SEC for public companies)
  • Client / customer notification per legal review
  • Internal communication to staff

Phase 6 — Post-incident review

  • Written post-incident report within 30 days
  • Lessons-learned review with IR team and leadership
  • IR plan updated with new playbook items
  • Control gaps remediated or entered into the risk register

6. Communication templates

Keep pre-drafted communication templates on hand so you’re not writing from scratch during a live incident:

  • Internal staff announcement (short, factual, what to do / not do)
  • Client notification (per your counsel's guidance — legal exposure is real)
  • Regulator notification letter (per your compliance framework)
  • Press statement (only used if incident is public — prepared, not sent by default)

7. Annual testing

Schedule a tabletop exercise every 12 months. Walk through one ransomware scenario and one data-breach scenario with the full IR team, your MSP, and your legal / insurance contacts. Document what worked and what didn’t — the point isn’t to pass the test; it’s to find the gaps before they matter.