Free template

Incident Response SOP Template

Free, ready-to-use incident response SOP template for detecting, containing, and recovering from security incidents. Copy, customize, or create it in Folge with screenshots.

What is an Incident Response SOP?

An Incident Response Standard Operating Procedure (SOP) is a documented plan that guides your IT and security team through the process of detecting, analyzing, containing, eradicating, and recovering from security incidents such as data breaches, malware infections, and unauthorized access.

This template follows the NIST incident response framework and gives your team a clear, step-by-step playbook to follow under pressure. A well-rehearsed incident response plan reduces downtime, limits damage, and ensures compliance with breach notification requirements.

When to Use This SOP Template

IT Security Teams

Standardize how your team detects, contains, and responds to security incidents

Compliance Requirements

Meet SOC 2, HIPAA, PCI-DSS, and GDPR requirements for documented incident response

MSPs & Managed Security

Provide consistent incident handling across multiple client environments

Tabletop Exercises

Use as a basis for incident response drills and team training scenarios

Incident Response SOP Template

Get this template instantly — copy or download, then customize for your team.

✨ Create in Folge

📋 Template Overview

Purpose: To provide a structured, repeatable process for detecting, containing, eradicating, and recovering from security incidents

Scope: All IT and security staff responsible for incident detection and response

Time Required: Varies by severity — initial triage within 15 minutes, containment within 1-4 hours

Tools Needed: SIEM (Splunk, Sentinel, etc.), EDR (CrowdStrike, SentinelOne), Ticketing system, Communication channel (dedicated Slack/Teams channel)

Step-by-Step Procedure

1
Detection and Initial Triage

Action:

  • Identify the potential incident through one of these channels:
    • SIEM/monitoring alerts
    • EDR/antivirus detection
    • User-reported suspicious activity
    • Third-party notification (vendor, CERT, law enforcement)
  • Perform initial triage:
    • Is this a true positive or a false alarm?
    • What systems, data, or users are affected?
    • Is the incident still active or has it been contained?
  • Assign a severity level:
    • Critical: Active data breach, ransomware, or compromise of production systems
    • High: Confirmed malware, unauthorized access, or potential data exposure
    • Medium: Suspicious activity requiring investigation (phishing, policy violation)
    • Low: Minor policy violation, informational alert
  • Create an incident ticket with all known details

⚠️ Important: For Critical and High severity incidents, immediately activate the incident response team and begin containment. Do not wait for a complete investigation before acting.

Expected Outcome: Incident detected, triaged, severity assigned, and incident ticket created

2
Activate the Incident Response Team

Action:

  • Notify the incident response team based on severity:
    • Critical/High: IR Lead, Security Engineer, System Admin, Legal, Communications, Management
    • Medium: IR Lead, Security Engineer
    • Low: Assigned security analyst
  • Open a dedicated communication channel (Slack channel, Teams room, or bridge call)
  • Assign roles:
    • Incident Commander: Coordinates the response, makes decisions
    • Technical Lead: Directs investigation and containment
    • Scribe: Documents all actions, findings, and decisions with timestamps
    • Communications Lead: Manages internal and external communication
  • Begin an incident timeline log — every action and finding must be timestamped

Expected Outcome: IR team assembled, roles assigned, communication channel open, and timeline logging started

3
Contain the Incident

Action:

  • Implement short-term containment to stop the spread:
    • Isolate affected systems from the network (disable network ports, quarantine VMs)
    • Disable compromised user accounts
    • Block malicious IPs, domains, or email addresses at the firewall/proxy
    • Revoke compromised API keys or tokens
  • Preserve evidence before making changes:
    • Take memory dumps and disk images of affected systems
    • Export relevant SIEM logs and firewall logs
    • Screenshot any active indicators of compromise
    • Store evidence in a secure, access-controlled location
  • Implement long-term containment:
    • Patch the exploited vulnerability
    • Strengthen firewall rules
    • Force password resets for affected accounts

⚠️ Note: Document every containment action taken — what, when, who, and why. This is critical for the post-incident report and potential legal proceedings.

Expected Outcome: Incident contained, evidence preserved, and affected systems isolated

4
Eradicate the Threat

Action:

  • Identify and remove all traces of the threat:
    • Remove malware, backdoors, and unauthorized accounts
    • Clean or reimage affected systems
    • Patch all systems with the exploited vulnerability
    • Scan the environment for additional indicators of compromise (IOCs)
  • Verify eradication:
    • Run EDR scans on all potentially affected systems
    • Review logs for any remaining suspicious activity
    • Confirm all compromised credentials have been reset
    • Validate that the attack vector has been closed

Expected Outcome: All traces of the threat removed and verified, attack vector closed

5
Recovery and Restoration

Action:

  • Restore affected systems to normal operations:
    • Restore from verified clean backups if systems were reimaged
    • Reconnect isolated systems to the network in a controlled manner
    • Re-enable disabled user accounts with new credentials
    • Verify all services and applications are functioning correctly
  • Implement enhanced monitoring:
    • Increase logging on previously affected systems
    • Add detection rules for the specific IOCs observed
    • Monitor for any signs of re-compromise for at least 30 days
  • Communicate recovery status to stakeholders

Expected Outcome: All systems restored, enhanced monitoring in place, and stakeholders informed

6
Post-Incident Review

Action:

  • Conduct a post-incident review meeting within 5 business days:
    • What happened? (timeline of events)
    • How was it detected? (and could we detect it faster?)
    • What was the impact? (systems, data, users, business)
    • What went well in the response?
    • What could be improved?
  • Complete the incident report:
    • Executive summary
    • Detailed timeline
    • Root cause analysis
    • Impact assessment
    • Remediation actions taken and planned
    • Recommendations to prevent recurrence
  • Handle compliance notifications if required (GDPR 72-hour notification, HIPAA breach notification, etc.)
  • Update detection rules, playbooks, and this SOP based on lessons learned

Expected Outcome: Post-incident review complete, report filed, compliance notifications sent, and processes improved

Best Practices for Incident Response

✓ Contain First, Investigate Second

When an active breach is detected, stop the bleeding before trying to understand the full picture. Isolate affected systems immediately — you can investigate from preserved evidence later.

✓ Document Everything

Assign a dedicated scribe to log every action, decision, and finding with timestamps. This timeline is critical for the post-incident report, legal proceedings, and compliance notifications.

✓ Preserve Evidence

Take memory dumps and disk images before cleaning or reimaging systems. Evidence that's destroyed during remediation cannot be recovered for forensic analysis or legal use.

✓ Practice Regularly

Run tabletop exercises quarterly. Walk through scenarios with your team so the response process is automatic under pressure. Update your SOP after each exercise.

✓ Communicate Clearly

Keep stakeholders informed with regular, factual updates. Avoid speculation. Designate a single communications lead to prevent conflicting messages.

✓ Learn from Every Incident

The post-incident review is the most valuable part of the process. Every incident reveals a gap — in detection, response, or prevention. Fix the gap before it's exploited again.

Create This SOP in Minutes with Folge

Stop copying and pasting templates. Create interactive, screenshot-based SOPs that your team will actually use.

  • Capture your actual incident response workflow
  • Add annotations & highlights
  • Export to PDF, Word, or HTML
System Requirements: Windows 7 ( partial support), 8, 8.1, 10, 11 (64-bit only). OSX > 10.10. Available in 🇬🇧, 🇫🇷, 🇩🇪, 🇪🇸 , 🇮🇹, 🇳🇱, 🇵🇹/🇧🇷 and 🇯🇵 languages.

Frequently Asked Questions

What qualifies as a security incident?

A security incident is any event that threatens the confidentiality, integrity, or availability of your systems or data. This includes confirmed malware infections, unauthorized access, data breaches, ransomware attacks, phishing compromises, and denial-of-service attacks. Suspicious activity that hasn't been confirmed is treated as a potential incident until triaged.

How quickly do I need to respond to a security incident?

Initial triage should happen within 15 minutes of detection. For critical incidents, containment should begin within 1 hour. GDPR requires breach notification to authorities within 72 hours, while HIPAA requires notification within 60 days. Your response speed directly affects the scope of damage.

Do I need an incident response plan for compliance?

Yes. SOC 2, HIPAA, PCI-DSS, GDPR, ISO 27001, and most other compliance frameworks require a documented incident response plan. Beyond compliance, a well-practiced IR plan significantly reduces the business impact of security incidents.

How do I create a visual incident response SOP with screenshots?

Use Folge to capture your screen as you walk through the incident response workflow — checking SIEM alerts, isolating systems, running EDR scans, and documenting findings. Folge takes screenshots at each step and lets you annotate them. Export as a PDF or HTML playbook for your team.

Related SOP Templates

Drawing Moonlanding

Start creating your documentation right now!

Folge is a desktop application. Download and use it for free forever or upgrade for lifetime features and support.

Looks like you are on mobile phone. Click here to send yourself download links for later
System Requirements: Windows 7 ( partial support), 8, 8.1, 10, 11 (64-bit only). OSX > 10.10. Available in 🇬🇧, 🇫🇷, 🇩🇪, 🇪🇸 , 🇮🇹, 🇳🇱, 🇵🇹/🇧🇷 and 🇯🇵 languages.
The Gold Standard Of Guide Creation
Jonathan, Product Director