Giter Club home page Giter Club logo

incident-response-plan-template's Introduction

Incident Response Plan Template

About

This template was developed by the team at Counteractive Security, to help all organizations get a good start on a concise, directive, specific, flexible, and free incident response plan. Build a plan you will actually use to respond effectively, minimize cost and impact, and get back to business as soon as possible.

The latest release

Instructions

Download or fork this template

The layout is as follows:

  • during.md: the core of the plan, actions taken during an incident response.
  • playbooks/: a folder containing playbooks with investigation, remediation, and communication suggestions for specific incidents. Create playbooks for any incidents that are highly likely or highly damaging for your organization. playbooks/index.md contains the playbook section header content, and each playbook should follow the convention playbooks/playbook-[THREAT].md.
  • roles/: a folder containing descriptions of each role in the plan, along with duties and training notes. index.md contains the roles section header content, and each role should follow the convention playbooks/role-[ORDER]-[NAME].md.
  • after.md: the guide to after-action review (a.k.a., hotwash, debrief, or post-mortem)---actions taken after an incident response.
  • about.md: a footer containing information about the plan/template as a whole.
  • info.yml: a file containing values for the template strings throughout the plan (see below)

Customize info.yml with your organization's information

The template files have a lot of placeholders that {{LOOK_LIKE_THIS}}. The purpose of each placeholder should be discernable from context, and the default info.yml file is commented for additional clarity.

This is the mustache template syntax, and has wide support in a variety of tools and languages. The easiest way to replace these is to customize the info.yml file with your organization's information and use the provided makefile (as of v1.0.0) to automatically find and replace all the relevant strings. In your terminal of choice (use WSL on Windows), type:

make

If you don't have the information or tools referenced in the template variables, consider fixing that. Especially the critical information list (data you want to protect) and critical asset list (systems you want to protect).

This merges the template components, combines them with your custom data from info.yml, and outputs all supported formats in the public/ directory. That's it.

If you have a specific case and want more details, read on!

Customize

  1. Review all the TODO prompts for likely areas to customize, if desired. Delete them if no changes are required.
  2. Add any roles or playbooks relevant to your organization. These can also be added over time.
  3. Customize anything else! Whatever you feel is most effective for your organization.

Deploy

The makefile uses pandoc to create a variety of formats, or you can use the markdown files with mkdocs, hugo, or countless other platforms.

Example

An example is available in the examples directory, where we leave the html rendering from markdown to github.

Contact Us

For professional assistance with incident response, or with customizing, implementing, or testing your plan, please contact us at [email protected] or (888) 925-5765.

License

This template is provided under the Apache License, version 2.0. See the LICENSE and NOTICE files for additional information.

References and Additional Reading

To do

  • After Action, lessons learned, process improvement
  • Recovery
  • Ransomware playbook
  • Easier build process
  • Measures and Metrics
  • Business priorities
  • Testing procedure
  • Communication and escalation tree, including executives
  • Finance and budget
  • Continuing to enhance modularity ("puzzle-piece" approach)

Changelog

v1.0.0 - First versioned production release

Added

  • Added makefile and temporary directories to ease the build process

Changed

  • Renamed .yaml files to .yml
  • Updated README

incident-response-plan-template's People

Contributors

chris-counteractive avatar kathenry avatar willjrowe avatar

Watchers

James Cloos avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.