All Controls
Security Control

Incident Response Plan Documentation & Testing

NIST RespondRS.RP-1CIS Control 17: Incident Management

What This Control Means

An incident response plan (IRP) is a documented set of procedures that guides the organization's response to cybersecurity incidents such as data breaches, ransomware attacks, business email compromise, and system intrusions. Without a plan, organizations respond reactively and inconsistently, leading to delayed containment, greater damage, regulatory missteps, and larger financial losses.

A comprehensive IRP should define incident classification levels (severity tiers), roles and responsibilities (who does what), communication protocols (internal and external), containment and eradication procedures, evidence preservation steps, and recovery procedures. It should also include contact information for key parties: internal leadership, IT team, legal counsel, cyber insurance carrier, breach response vendors, and law enforcement.

Testing the plan through tabletop exercises is as important as writing it. A tabletop exercise walks the response team through a realistic scenario, such as a ransomware attack or a compromised vendor, to identify gaps, confusion, and bottlenecks in the plan. These exercises should be conducted at least annually and should involve leadership, IT, legal, and communications, not just the technical team.

The incident response plan should be treated as a living document that is updated based on lessons learned from exercises, actual incidents, and changes to the organization's environment. Storing the plan only on the corporate network defeats its purpose if a ransomware attack renders that network inaccessible, offline copies should be maintained and accessible during an emergency.

Why Insurers Care

An incident response plan is one of the most commonly required controls on cyber insurance applications. Insurers know that organizations with tested IRPs contain incidents faster and file smaller claims. Some carriers require an IRP as a condition of coverage, while others offer premium reductions for organizations with documented, tested plans.

Insurers also want to know that the plan includes their contact information and outlines the process for reporting incidents to the carrier promptly. Late notification to the insurer can jeopardize coverage. The IRP should specify at what point the insurance carrier is contacted and who is responsible for that notification.

Industry-Specific Notes

Healthcare (HIPAA)

HIPAA requires a security incident response plan under 45 CFR 164.308(a)(6). The plan must address detection, response, mitigation, and documentation of security incidents involving ePHI. Healthcare organizations must also account for HHS breach notification requirements (60-day notification window) and state-specific requirements.

Legal (ABA Guidelines)

Law firms face unique incident response challenges related to preserving attorney-client privilege during an investigation. The IRP should designate outside counsel to direct the breach response under privilege. Ethical obligations require prompt notification to affected clients, which must be coordinated with the legal assessment of the incident.

Financial Services (GLBA/PCI-DSS)

FFIEC requires financial institutions to maintain and regularly test incident response plans. Bank examiners specifically assess whether the IRP has been tested through tabletop exercises. Financial institutions must also account for regulatory notification requirements (OCC, FDIC, Federal Reserve) that have specific timeframes.

Retail / E-commerce (PCI-DSS)

Retail incident response plans must account for PCI-DSS breach notification requirements to card brands and acquirers, as well as state consumer notification laws. The plan should include procedures for isolating compromised POS systems while maintaining business operations during peak periods.

Government / Defense (CMMC 2.0)

NIST 800-171 control IR.L2-3.6.1 requires an incident response capability that includes preparation, detection, analysis, containment, recovery, and user response. CMMC assessors verify that the IRP exists, is tested, and includes all required elements. Federal contractors must also comply with DFARS 252.204-7012 72-hour reporting requirements.

Implementation Steps

Draft an incident response plan covering classification, roles, communication, containment, eradication, and recovery

Include contact information for leadership, legal counsel, insurance carrier, breach coach, forensics vendor, and law enforcement

Conduct an annual tabletop exercise with representatives from IT, leadership, legal, and communications

Maintain offline copies of the IRP (printed and on USB) accessible during network outages

Update the plan based on lessons learned from exercises, actual incidents, and organizational changes

Want to know how your organization measures up on this control?

Take the free assessment →