An incident response (IR) playbook is the written plan your team executes when things go wrong. Not the feature of a tool, not an idea, not a slide deck β a concrete document that says “when X happens, do Y, then Z, with owner A accountable.” This module covers playbook structure, the core playbooks every organisation should have, and how to make them actually useful.
Why written playbooks matter
At 2am during a real incident, people forget. Pressure degrades decision-making. Playbooks compensate: follow the script, don’t re-derive the workflow under stress. Also: onboarding (new staff know the process), auditing (demonstrable), and legal (defensible).
Playbook structure
- Scope β what incident type this covers
- Roles β who does what (Incident Commander, Scribe, Comms, Technical Lead, Executive Sponsor)
- Trigger β what activates this playbook
- Initial response checklist β first 30 minutes
- Investigation steps β scope, impact, root cause
- Containment β stop the bleeding
- Eradication β remove attacker foothold
- Recovery β restore to clean state
- Communication β who’s notified, when, by whom, with what message
- Lessons learned β post-incident review process
- Evidence handling β chain of custody, storage
- External contacts β law enforcement, regulator, DPA, cyber-insurance
Core playbooks to build first
- Ransomware β the one most organisations face
- Data breach / exfiltration β with DPDP notification obligations (if India)
- Phishing / credential compromise β common, lower-severity but frequent
- DDoS β operational response
- Insider threat β HR-involved, legal-heavy
- Third-party / supply-chain breach β cascading compromise
Sample structure β Ransomware playbook
# RANSOMWARE RESPONSE PLAYBOOK
## Trigger
User reports files can't open, ransom note visible, EDR alert on ransomware TTPs,
unusual encryption activity on file servers.
## Roles (auto-assigned based on rota)
- Incident Commander: [name] / backup: [name]
- Scribe: designated
- Technical Lead: CTO or delegated
- Communications: CEO signs off external
- Legal: [firm] / [contact]
## T+0 to T+30 min β Contain
[ ] IC acknowledges alert; opens incident channel (Slack/Teams)
[ ] Isolate affected systems from network (but DON'T power off β lose memory)
[ ] Disable VPN access for affected users
[ ] Rotate credentials of any potentially compromised accounts
[ ] Preserve encrypted files samples for analysis
[ ] Begin log collection from affected systems
[ ] Notify CEO, Legal, Insurance contact (insurance clock starts now)
[ ] Do NOT pay ransom; do NOT communicate with attackers yet
## T+30 min to T+2 hrs β Scope
[ ] Forensics team begins memory + disk acquisition
[ ] Identify initial access vector (phishing? RDP? supply chain?)
[ ] Enumerate affected systems + data
[ ] Confirm backup integrity (separate isolated copy)
[ ] Identify PII/PHI/financial data in affected scope
[ ] If Indian Data Principals affected: DPDP 72-hour clock started
## T+2 to T+24 hrs β Eradicate + Recover
[ ] Confirm attacker removed from environment
[ ] Restore from clean backups (verified-clean, not infected)
[ ] Rotate ALL credentials (assume worst case)
[ ] Patch initial access vector
[ ] Re-enable services progressively with enhanced monitoring
## T+24 to T+72 hrs β Notify + Document
[ ] DPDP notification to Board (if personal data affected)
[ ] Customer notifications as required
[ ] Public communication (if warranted)
[ ] Regulatory filings (RBI, SEBI, sector-specific)
[ ] Preserve all evidence for potential prosecution
## Communication templates
[ ] Internal all-hands message (template below)
[ ] Customer notification (template below)
[ ] Regulator notification (template below)
[ ] Press statement (legal-reviewed template below)
## External contacts
- Cyber insurance: [policy number, hotline]
- Incident response retainer: [firm, 24/7]
- Law enforcement: CERT-In (cybersecurity incidents in India)
- Data Protection Board: [process for DPDP breach notification]
- Outside counsel: [firm, contact]
## Evidence handling
- Memory dumps: SHA-256 hashed, AWS S3 with Object Lock, retained 7 years
- Logs: centralized SIEM, separate archive bucket
- Photos: timestamped, annotated
Tabletop exercises
Playbooks only work if the team has rehearsed. Tabletop exercises walk through a simulated incident β 2-3 hours, full team present, facilitator introduces new information every 15 min, team works through the playbook. Surfaces gaps in process, capability, or alignment.
Continue reading with Basic tier (βΉ499/month)
You've read 50% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.