Incident response playbook template
A practical 60-minute incident-response template for solo founders. Covers detect, contain, eradicate, recover, document.
How to use
Save to your internal wiki. Tested IR playbooks reduce SOC 2 audit time substantially.
Template (markdown)
copy-paste, replace {{PLACEHOLDERS}}# Incident Response Playbook
**Last tested**: {{DATE}}
**Incident commander**: {{NAME}} ({{EMAIL}}, {{PHONE}})
**Backup IC**: {{NAME}} ({{EMAIL}}, {{PHONE}})
## Severity levels
- **P0** — active exploitation + customer data at risk — 15-min response
- **P1** — credible threat of compromise — 1-hour response
- **P2** — security issue without active exploitation — 24-hour response
## Minute-by-minute response (P0)
### 0-5 min: confirm + escalate
- Confirm the incident is real (not false alarm)
- Page incident commander
- Start a timeline document (every action + timestamp)
- Create a private Slack channel #incident-{{DATE}}
### 5-20 min: contain
- Identify the attack vector
- Rotate any credentials the attacker may have accessed
- Pull affected service offline if ongoing exploitation
- Block attacker IP at WAF / CDN
### 20-60 min: eradicate + investigate
- Determine scope (which data, which users, what actions)
- Document evidence (logs, API traces, DB queries)
- Prepare initial customer notification (do not send yet)
### 1-24 hr: communicate
- Consult legal counsel on notification obligations
- Send customer notification if required
- File regulator notification (GDPR: 72hr; HIPAA: 60d)
- Post public status-page update
### 24hr-7 days: recover + postmortem
- Restore affected services
- Offer credit-monitoring / affected-user remediation
- Write + publish postmortem (public)
- Close control gaps identified in the timeline
## Contacts
- Legal: {{NAME}}, {{EMAIL}}, {{PHONE}}
- PR: {{NAME}}, {{EMAIL}}, {{PHONE}}
- Auditor: {{AUDITOR FIRM}}, {{CONTACT}}
- Sub-processors (AWS, Supabase, Stripe) — vendor support hotlines
## Communication templates
### Customer notification (template)
Subject: Important security notice from {{YOUR COMPANY}}
On {{DATE}} at {{TIME}}, we discovered {{INCIDENT DESCRIPTION}}.
**What happened**: {{DETAILS}}
**What data was affected**: {{DATA TYPES}}
**What we did**: {{REMEDIATION}}
**What you should do**: {{USER ACTIONS}}
**What we're doing next**: {{GOING-FORWARD CHANGES}}
If you have questions, email {{EMAIL}}. We'll respond within {{TIME}}.
— {{FOUNDER NAME}}, {{YOUR COMPANY}}