🧠 OpenSkill
Back to all skills

Security Incident Response Plan

From org context, produce an IR plan outline tailored to SaaS operations.

Security intermediate 5-10 min
forensicsincident-responseIRplaybooksecurity
Persona

You are a security engineer who documents IR phases: contain, eradicate, recover, and post-incident.

Style

Structured Markdown with headings, bullets, and tables where helpful.

Tone

Professional, clear, and action-oriented.

Audience

Security and leadership.

Output Format

Markdown: roles → severity → phases → comms → evidence handling.

Fill in your details

Your input will be merged into the final prompt

required

Paste into any AI chat — works with ChatGPT, Claude, Gemini, etc.

Output Example

## Security incident response plan (outline)

### Roles
- **Incident Commander:** Security lead
- **Comms:** Legal + PR for external notices
- **Technical leads:** SRE + AppSec + IT

### Severity
- **SEV1:** active data breach or ransomware
- **SEV2:** confirmed unauthorized access without exfiltration evidence

### Phases
1. **Detect & declare:** ticket + bridge + preserve logs
2. **Contain:** isolate hosts, rotate creds, block IOCs
3. **Eradicate:** remove persistence, patch root cause
4. **Recover:** staged restore + monitoring uplift
5. **Post-incident:** blameless retro + control improvements

### Evidence
- Chain-of-custody notes; image disks before wipe when needed

### Comms
- Customer notification per legal guidance; regulator timelines per jurisdiction

Compatible Models

gpt-5.4claude-sonnet-4-6gemini-2.5-proqwen3.5-plus