Free template
Free, ready-to-use incident response SOP template for detecting, containing, and recovering from security incidents. Copy, customize, or create it in Folge with screenshots.
An Incident Response Standard Operating Procedure (SOP) is a documented plan that guides your IT and security team through the process of detecting, analyzing, containing, eradicating, and recovering from security incidents such as data breaches, malware infections, and unauthorized access.
This template follows the NIST incident response framework and gives your team a clear, step-by-step playbook to follow under pressure. A well-rehearsed incident response plan reduces downtime, limits damage, and ensures compliance with breach notification requirements.
Standardize how your team detects, contains, and responds to security incidents
Meet SOC 2, HIPAA, PCI-DSS, and GDPR requirements for documented incident response
Provide consistent incident handling across multiple client environments
Use as a basis for incident response drills and team training scenarios
Purpose: To provide a structured, repeatable process for detecting, containing, eradicating, and recovering from security incidents
Scope: All IT and security staff responsible for incident detection and response
Time Required: Varies by severity — initial triage within 15 minutes, containment within 1-4 hours
Tools Needed: SIEM (Splunk, Sentinel, etc.), EDR (CrowdStrike, SentinelOne), Ticketing system, Communication channel (dedicated Slack/Teams channel)
Action:
⚠️ Important: For Critical and High severity incidents, immediately activate the incident response team and begin containment. Do not wait for a complete investigation before acting.
Expected Outcome: Incident detected, triaged, severity assigned, and incident ticket created
Action:
Expected Outcome: IR team assembled, roles assigned, communication channel open, and timeline logging started
Action:
⚠️ Note: Document every containment action taken — what, when, who, and why. This is critical for the post-incident report and potential legal proceedings.
Expected Outcome: Incident contained, evidence preserved, and affected systems isolated
Action:
Expected Outcome: All traces of the threat removed and verified, attack vector closed
Action:
Expected Outcome: All systems restored, enhanced monitoring in place, and stakeholders informed
Action:
Expected Outcome: Post-incident review complete, report filed, compliance notifications sent, and processes improved
When an active breach is detected, stop the bleeding before trying to understand the full picture. Isolate affected systems immediately — you can investigate from preserved evidence later.
Assign a dedicated scribe to log every action, decision, and finding with timestamps. This timeline is critical for the post-incident report, legal proceedings, and compliance notifications.
Take memory dumps and disk images before cleaning or reimaging systems. Evidence that's destroyed during remediation cannot be recovered for forensic analysis or legal use.
Run tabletop exercises quarterly. Walk through scenarios with your team so the response process is automatic under pressure. Update your SOP after each exercise.
Keep stakeholders informed with regular, factual updates. Avoid speculation. Designate a single communications lead to prevent conflicting messages.
The post-incident review is the most valuable part of the process. Every incident reveals a gap — in detection, response, or prevention. Fix the gap before it's exploited again.
Stop copying and pasting templates. Create interactive, screenshot-based SOPs that your team will actually use.
A security incident is any event that threatens the confidentiality, integrity, or availability of your systems or data. This includes confirmed malware infections, unauthorized access, data breaches, ransomware attacks, phishing compromises, and denial-of-service attacks. Suspicious activity that hasn't been confirmed is treated as a potential incident until triaged.
Initial triage should happen within 15 minutes of detection. For critical incidents, containment should begin within 1 hour. GDPR requires breach notification to authorities within 72 hours, while HIPAA requires notification within 60 days. Your response speed directly affects the scope of damage.
Yes. SOC 2, HIPAA, PCI-DSS, GDPR, ISO 27001, and most other compliance frameworks require a documented incident response plan. Beyond compliance, a well-practiced IR plan significantly reduces the business impact of security incidents.
Use Folge to capture your screen as you walk through the incident response workflow — checking SIEM alerts, isolating systems, running EDR scans, and documenting findings. Folge takes screenshots at each step and lets you annotate them. Export as a PDF or HTML playbook for your team.

Folge is a desktop application. Download and use it for free forever or upgrade for lifetime features and support.
The Gold Standard Of Guide Creation
