De4sec
De4sec Technology
de4sec.technology
๐ŸŒ AU + KE

Cyber Incident Response Guide

A structured guide to planning, exercising, and executing a cyber incident response โ€” from preparation through lessons learned.

Prepared by
De4sec Technology
Contact
support@de4sec.technology
CONFIDENTIAL ยท FOR CLIENT USE ONLY
Contents
  1. Why Incident Response Planning Matters Before the Incident
  2. The Six Phases of Incident Response
  3. Preparation: Building the Plan
  4. Identification: Detecting and Confirming
  5. Containment, Eradication and Recovery
  6. Legal and Regulatory Obligations
  7. De4sec Incident Response Service
01

Why Incident Response Planning Matters Before the Incident

An incident response plan is one of those documents that nobody wants to write โ€” until they need it. And by the time they need it, it's too late to write it.

Organisations that respond well to cyber incidents are not those who are more secure than average. They're those who had a plan, practiced it, and knew exactly what to do in the first 30 minutes. Decisions made under crisis pressure without a plan compound damage exponentially.

Businesses with a documented and practiced incident response plan recover from incidents 40% faster and at significantly lower cost than those without one. Source: IBM Cost of a Data Breach Report 2024.

02

The Six Phases of Incident Response

PhaseDescriptionKey Outcomes
PreparationBuild and test the plan before an incidentIRP documented, contacts ready, staff trained
IdentificationDetect and confirm an incident is occurringIncident confirmed, scope understood, IR team assembled
ContainmentLimit the spread and damageAffected systems isolated, attack vector closed
EradicationRemove the threat from the environmentAttacker access removed, malware cleared, vulnerabilities patched
RecoveryRestore normal operationsSystems restored, credentials reset, monitoring enhanced
Lessons LearnedReview what happened and improveRoot cause documented, controls improved, plan updated
03

Preparation: Building the Plan

What the plan must contain

โœ“Incident classification criteria โ€” what constitutes a P1/P2/P3 incident?
โœ“Escalation matrix โ€” who to call, in what order, at what severity
โœ“IR team roles โ€” Incident Commander, Technical Lead, Communications Lead, Legal Liaison
โœ“Communication templates โ€” staff notification, client notification, media statement, regulator notification
โœ“Evidence preservation checklist โ€” what to collect, what not to delete
โœ“Forensic contacts โ€” your IR provider (De4sec), forensic investigators, law enforcement contacts if relevant
โœ“Insurance contacts โ€” policy number, insurer IR hotline
โœ“Recovery procedures โ€” how to restore from backup, system build order

Tabletop exercises

A tabletop exercise walks the IR team through a simulated incident scenario โ€” discussing what they would do at each stage โ€” without actually taking any technical action. Run quarterly to keep the plan current and the team familiar with it.

04

Identification: Detecting and Confirming

Alert sources

โœ“Microsoft Sentinel SIEM โ€” automated alert correlation across all log sources
โœ“Microsoft Defender for Endpoint โ€” endpoint alerts (malware, unusual behaviour, credential theft)
โœ“Defender for Office 365 โ€” email-based threat alerts
โœ“Staff reports โ€” users reporting suspicious activity, unexpected MFA prompts, unavailable files
โœ“Third-party tips โ€” supplier notification, law enforcement, ACSC or Communications Authority alert

First 15 minutes

โœ“Assemble the IR team โ€” do not handle alone
โœ“Confirm the incident is real โ€” rule out false positive before declaring
โœ“Document everything from this point โ€” timestamps, observations, actions taken
โœ“Do not attempt remediation before understanding scope โ€” premature remediation destroys forensic evidence
โœ“Contact De4sec โ€” +61 451 500 909 (AU) | +254 741 777 681 (KE)
05

Containment, Eradication and Recovery

Short-term containment

โœ“Isolate affected devices โ€” Defender for Endpoint device isolation feature or physical disconnect
โœ“Disable compromised user accounts โ€” not just password reset, but complete disablement
โœ“Block malicious IPs, domains, and file hashes at firewall and email gateway
โœ“Preserve forensic evidence โ€” disk images of affected systems before wiping

Eradication

โœ“Do not clean infected systems โ€” rebuild from known-good OS image
โœ“Remove persistence mechanisms โ€” scheduled tasks, registry run keys, new user accounts
โœ“Patch the exploited vulnerability โ€” or remove the exposed service
โœ“Reset ALL credentials โ€” every password, every API key, every service account

Recovery

โœ“Restore data from last known-clean backup โ€” verify backup pre-dates the compromise
โœ“Rebuild systems from clean images โ€” deploy security baseline before returning to production
โœ“Enhanced monitoring for 30 days post-recovery โ€” attackers sometimes have secondary access
โœ“Communicate with stakeholders โ€” clients, staff, regulators as appropriate
06

Legal and Regulatory Obligations

Cyber incidents often trigger legal obligations โ€” particularly where personal data is involved. These obligations vary by jurisdiction.

JurisdictionRegulationNotification Requirement
AustraliaPrivacy Act 1988 (Notifiable Data Breaches)Notify OAIC and affected individuals within 30 days if serious harm likely
KenyaData Protection Act 2019 (KDPA)Notify ODPC within 72 hours if breach likely to result in risk to individuals
EU/EEA customersGDPR72-hour notification to supervisory authority
AllCyber insurance policyNotify insurer immediately โ€” most policies require immediate notification

Failure to notify regulators within required timeframes can result in significant fines โ€” in some cases larger than the cost of the incident itself. Legal counsel should be engaged at the start of any incident involving personal data.

07

De4sec Incident Response Service

IR Planning
Develop a customised incident response plan, tabletop exercise facilitation, and staff training.
24/7 IR Hotline
AU: +61 451 500 909 | KE: +254 741 777 681 | Email: support@de4sec.technology
Technical Response
Remote incident response: containment, forensic investigation, eradication, recovery coordination.
Post-Incident Report
Root cause analysis, attack timeline reconstruction, control gap identification, remediation roadmap.
// NEXT STEP

Ready to get started?

De4sec provides hands-on implementation. Book a free discovery call at no cost.

Book a Free Discovery Call โ†’de4sec.technology
De4sec
ยฉ 2026 DE4SEC TECHNOLOGY. ALL RIGHTS RESERVED.