Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

IT emergency management: incident response and crisis management

A structured guide to IT incident management: from developing an incident response plan and managing the first 72 hours following a cyberattack to legal reporting requirements under NIS2 and the GDPR. Includes templates and checklists.

Table of Contents (7 sections)

Summary: A simulated crisis exercise in which a security team runs through a hypothetical attack or incident during a meeting—without affecting any actual systems. Tabletop exercises identify gaps in incident response plans before a real incident occurs.

IT Incident Management is the organized preparation for, response to, and recovery from IT security incidents. The difference between a disaster and a successfully managed incident often lies solely in the existence of a good plan.

The NIST Incident Response Framework

The NIST (National Institute of Standards and Technology) defines 4 phases:

Phase 1: PREPARATION
  → Create an incident response plan
  → Define the team, clarify roles
  → Provide tools (forensic software, backup systems)
  → Conduct regular drills (tabletop exercises)

Phase 2: DETECTION & ANALYSIS
  → Detect the incident (SIEM alert, user report, external report)
  → Assess scope and severity
  → Back up logs (do not overwrite!)
  → Document timestamps

Phase 3: CONTAINMENT, ERADICATION & RECOVERY
  (Containment, Eradication & Recovery)
  → Stop the spread of damage
  → Remove the attacker from the system
  → Gradually restore systems

Phase 4: POST-INCIDENT ACTIVITIES
  → Root Cause Analysis
  → Lessons Learned
  → Improve processes
  → Finalize regulatory reports

The Incident Response Plan

Core Elements of an IR Plan

1. Incident Classification Matrix

Severity Levels:

P1 - CRITICAL:
  Ongoing ransomware attack
  Complete system/network failure
  Active APT compromise
  → Immediate escalation to C-level
  → Fully activate crisis team

P2 - HIGH:
  Compromised admin account
  Loss of sensitive data
  Malware on multiple systems
  → Notify IT management and CISO
  → Activate forensic service provider

P3 - MEDIUM:
  Compromised standard user account
  Malware on a single endpoint (isolated)
  Phishing email opened
  → Standard IT security process

P4 - LOW:
  Spam campaign, no clicks
  Suspicious email reported
  → Documentation, standard response

2. RACI Matrix (Roles and Responsibilities)

Person/Role          Detect Decide Communicate Remediate
─────────────────────────────────────────────────────────────
IT Administrator      R/A       I           I             R
CISO/IT Manager        I         R/A         R             A
Executive Management    I         A (P1/P2)   R (external)    I
PR / Communications    I         I           R/A (external)  I
Data Protection Officer I         R (GDPR)   R (authorities)  I
Forensic Service Provider I        C           I             R/A
Legal Department       I         C           R (legal)     C

R=Responsible, A=Accountable, C=Consulted, I=Informed

3. Contact List (24/7)

Internal:
  CISO/IT Manager:      [Name] [Mobile] [Signal]
  CEO:     [Name] [Mobile]
  Data Protection Officer:  [Name] [Mobile]
  IT Emergency Hotline:   [Number] (24/7)

External - On-call (contractual):
  Forensics/IR Service:  [Company] [Number] [SLA: 4-hour response]
  Cyber Lawyer:        [Law Firm] [Contact Person]
  Cyber Insurance:  [Policy No.] [Claims Hotline]

Authorities:
  BSI / CERT-Bund:     0800 274 1000 (toll-free)
  LKA Cybercrime:      [relevant LKA]
  Data Protection Authority:  [enter state authority]

The First 72 Hours - Timeline

Hours 0-1: Detection and Initial Response

0:00 - Alert received (SIEM, user, external report)
0:05 - IT administrator notified → Initial assessment
0:15 - CISO/IT director notified
0:20 - Determine scope: How many systems? What data?
0:30 – Decision: Severity level P1/P2/P3/P4?
0:45 – P1/P2: Convene crisis team, notify management
1:00 – Initial containment measures (isolate affected systems)

Hours 1–4: Containment

First goal: Stop the spread, don’t fix it!

For ransomware/malware:
  ✓ Disconnect affected systems from the network (physically disconnect cables)
  ✓ DO NOT shut down (forensic data in RAM will be lost)
  ✓ Back up logs BEFORE isolating systems
  ✓ Change passwords for all affected accounts
  ✓ Lock admin accounts → recreate with new credentials

For compromised accounts:
  ✓ Deactivate account (do not delete—forensic evidence)
  ✓ Invalidate all sessions
  ✓ Check all of the user’s devices
  ✓ What data did the account have access to? → Define scope

Hours 4–24: GDPR Reporting Obligation

GDPR Art. 33:
  24h: Initial assessment of whether personal data is affected
  72h: If affected → Report to data protection authority

Report form includes:
  → Type of incident (ransomware, data breach, etc.)
  → Categories and approximate number of affected individuals
  → Likely consequences
  → Measures taken

If unclear: Preliminary notification ("precautionary notification") is possible
  "Incident detected, scope still unclear, update to follow"

Hours 24–72: NIS2 reporting obligation (for affected companies)

NIS2 Art. 23:
  24h: Early warning to BSI
    → Incident type, initial assessment
    → No full report required
  72h: Full report
    → Cause, if known
    → Impact and countermeasures
  30 days: Final report

Reporting office: BSI / CERT-Bund (online portal)

Forensics: Securing evidence

Important: Secure forensic evidence before systems are cleaned or reset.

Artifacts to be secured:

Memory (RAM):
  → Memory dump before shutdown (contains running processes, credentials)
  → Tools: DumpIt, WinPmem, LiME (Linux)

Hard drives:
  → Forensic copy (bit-for-bit copy) BEFORE cleaning
  → Hash value (SHA256) for chain of evidence
  → Tools: dd, FTK Imager, EnCase

Logs:
  → Windows Event Logs (System, Security, Application)
  → PowerShell logs (Module Logging, Script Block Logging)
  → Firewall logs, proxy logs, DNS logs
  → SIEM export for the last 30–90 days

Network:
  → All outbound connections from the last few hours/days
  → PCAP captures if available

Business Continuity During the Incident

Questions that must be answered immediately:

Communication:
  → How does the company communicate during the incident?
  → Email may be compromised → Signal/Threema as a backup?
  → External communication: who speaks with customers, the press, and authorities?

Operations:
  → Can critical processes continue to run manually?
  → Which systems are critical vs. non-critical?
  → Are there hot-standby systems?

Backup:
  → When was the last clean backup?
  → Have backups also been encrypted by the attacker?
  → Recovery Time Objective (RTO): When must operations be back up and running?

Tabletop Exercise - Practicing Incident Response

The best preparation is practice—before things get serious:

Tabletop Exercise Format:
  Duration: 2–4 hours
  Participants: IT, management, communications, legal
  Format: Scenario is read aloud; team discusses response

Sample Scenario:
  "Monday, 6:30 a.m. Employees call in: all servers display
   encrypted files and a ransom demand.
   What will you do in the next 60 minutes?"

Evaluation:
  → How long did it take until the first alert?
  → Were all contacts reachable?
  → Did everyone know their role?
  → What gaps in the plan were discovered?

Lessons Learned and Continuous Improvement

After each incident (P1-P3):

Post-Incident Review (within 1–2 weeks):
  → Reconstruct the incident timeline
  → Root Cause Analysis: How did the attacker gain access?
  → What worked? What didn’t?
  → What controls could have prevented this or detected it earlier?

Typical findings:
  "MFA was missing on the VPN → Immediate action: Implement MFA"
  "SIEM had no rule for this attack → Create new SIEM rule"
  "Backup restoration took 8 hours → RTO not met → Revise backup strategy"
  "Communication paths unclear → Update RACI"

IT incident management is not a one-time project—it is a continuous process consisting of preparation, practice, response, and improvement.

Preparation (1 week in advance)

  • Define the objective: What do we want to test?
  • Invite participants: IT, management, HR, Legal, Marketing, external partners if applicable
  • Select scenario: Ransomware attack (most common use case)
  • Distribute materials: IR plan, contact lists, BCP documents
  • Brief the moderator: Prepare injection cards
TimeInject
8:00 AM"The local system administrator is on vacation. Unreachable."
9:00 AM"A journalist from the WAZ calls – does he already have the story?"
10:30"The BSI is in touch: Was this a state-sponsored attacker?"
11:00"Your partner hospital is also affected"
12:00"NIS2 requirement: Report to the BSI by 5:00 PM today"
14:00"An employee panicked and reset their laptop"

Preparation

  • Define objective and scope (What are we testing? What are we NOT testing?)
  • Participants: all relevant roles (not just IT!)
  • Select scenario: ransomware / data breach / DDoS / insider threat
  • Write injection cards (5–8 are sufficient for a 4-hour exercise)
  • Facilitator: internal or external (external facilitator = more objective)
  • Materials: IR plan, emergency checklist, insurance policy
  • Set timeframe (4–6 hours for a medium-sized TTX)

Sources & References

  1. [1] NIST SP 800-61 Computer Security Incident Handling Guide - NIST
  2. [2] BSI IT-Grundschutz DER.2: Security Incident Management - BSI
  3. [3] NIS2 Art. 23 - Meldepflichten - EU

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Oskar Braun
Oskar Braun

Abteilungsleiter Information Security Consulting

E-Mail

Dipl.-Math. (WWU Münster) und Promovend am Promotionskolleg NRW (Hochschule Rhein-Waal) mit Forschungsschwerpunkt Phishing-Awareness, Behavioral Security und Nudging in der IT-Sicherheit. Verantwortet den Aufbau und die Pflege von ISMS, leitet interne Audits nach ISO/IEC 27001:2022 und berät als externer ISB in KRITIS-Branchen. Lehrbeauftragter für Communication Security an der Hochschule Rhein-Waal und NIS2-Schulungsleiter bei der isits AG.

ISO 27001 Lead Auditor (IRCA) ISB (TÜV)
This article was last edited on 03/29/2026. Responsible: Oskar Braun, Abteilungsleiter Information Security Consulting at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"