Cyber Security Incident Response Planning: Practitioner Guide
Cyber Security Incident Response Planning: Practitioner Guide
Response Planning:
Practitioner Guide
First published: January 2022
Last updated: December 2024
Table of contents
Introduction 1
Context 1
Purpose 1
Acknowledgements 1
Contact details 2
Version control 3
Objectives 4
Communications 12
Internal communications 12
External communications 13
Jurisdictional arrangements 15
National arrangements 15
Insurance 16
Investigation questions 18
Documentation 20
Recovery 22
Stand down 22
Training 24
Managing responses to cyber security incidents is the responsibility of affected organisations. As such, all
organisations should have a Cyber Security Incident Response Plan (CSIRP) to ensure an effective response and
prompt recovery in the event that system controls do not prevent a cyber security incident from occurring. This plan
should be regularly tested and reviewed.
To be effective, a CSIRP should align with organisations’ emergency, crisis and business continuity arrangements, as
well as jurisdictional and national cyber and emergency arrangements. It should support personnel to fulfil their roles
by outlining their responsibilities and all legal and regulatory obligations.
While organisations are responsible for managing cyber security incidents affecting their business, Australia’s Cyber
Incident Management Arrangements outline the inter-jurisdictional coordination arrangements and principles when
responding to national cyber security incidents.
Purpose
This guidance (which acts as a CSIRP Template) and the Cyber Security Incident Response Readiness Checklist
(Appendix B) are intended to be used as a starting point for organisations to develop their own CSIRP and readiness
checklists. Each organisation’s CSIRP and checklist will need to be tailored according to their own unique operating
environment, priorities, resources and obligations.
In addition to a CSIRP, organisations can develop more detailed day-to-day processes and procedures to supplement
the CSIRP. This could include detailed playbooks to aid in the response to common types of cyber security incidents,
such as ransomware or data breaches, and Standard Operating Procedures (SOPs) to respond to cyber security
incidents affecting specific assets.
Acknowledgements
This guidance was created using multiple resources. ASD acknowledges the following resources used in its
development:
CSIRP Template developed by the Australian Energy Sector Readiness and Resilience Working Group in 2019,
specifically with support from the Australian Energy Market Operator, Tasmanian Department of State Growth,
the Victorian Government Department of Premier and Cabinet and ASD
Victorian Government Cyber Incident Management Plan and Cyber Incident Response Plan Template
Cybersecurity & Infrastructure Security Agency Federal Government Cybersecurity Incident and Vulnerability
Response Playbooks
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-61 Rev. 2, Computer Security
Incident Handling Guide
ISO/IEC 27035-2:2023, Information technology – Information security incident management – Part 2: Guidelines
to plan and prepare for incident response
ISO/IEC 27035-3:2020, Information technology – Information security incident management – Part 3: Guidelines
for ICT incident response operations.
Contact details
If you have any questions regarding this guidance you can write to us or call us on 1300 CYBER1 (1300 292 371).
Document Control
Owner The risk owner or role responsible for enacting the CSIRP.
Date created
Last reviewed by
Version control
Purpose
To support a swift and effective response to cyber security incidents aligned with the organisation’s security and
business objectives.
Objectives
To provide guidance on the steps required to respond to cyber security incidents.
To outline the roles, responsibilities, accountabilities and authorities of personnel and teams required to manage
responses to cyber security incidents.
To outline legal and regulatory compliance requirements for cyber security incidents.
To outline internal and external communication processes when responding to cyber security incidents.
To provide guidance on post cyber security incident activities to support continuous improvement.
New South Wales Government Cyber Security Incident Emergency Sub Plan
Type Description
Attrition An attack that employs brute force methods to compromise, degrade or destroy systems,
services or networks (e.g. a Distributed Denial of Service intended to impair or deny access
to a service or application; or a brute force attack against an authentication mechanism,
such as passwords or digital signatures).
Email An attack executed via an email message or attachment (e.g. exploit code disguised as an
attached document or a link to a malicious website in the body of an email message).
External/Removable An attack executed from removable media or a peripheral device (e.g. malicious code
Media spreading to a system from infected removable media).
Impersonation An attack involving replacement of something benign with something malicious (e.g.
spoofing, person-in-the-middle attacks, rogue wireless access points and SQL injection
attacks).
Improper usage Any event resulting from the violation of an organisation’s acceptable usage policies by an
authorised user (e.g. a user installs file sharing software, leading to the loss of sensitive data;
or a user performs illegal activities on a system).
Loss or theft of The loss or theft of a computing device or media used by an organisation, such as a laptop,
equipment smartphone or authentication token.
Web An attack executed from a website or web-based application (e.g. a cross-site scripting
attack used to steal credentials or redirect to a site that exploits a web browser vulnerability
and installs malware).
Other An attack that does not fit into any of the above categories.
Type/Description Response
All personnel listed should be familiar with their responsibilities in the CSIRP and have practise their response.
Include details of any 3rd party vendors that provide or manage systems, services and/or networks. If applicable,
include details of external cyber security incident response providers and the services they provide.
Other CSIRT roles could include system administrators, network engineers, change managers, internal auditors, legal
advisors, finance and procurement specialists, and administration and recording keeping personnel.
Surge arrangements
Include process for implementing surge arrangements, the resources involved in those arrangements and thresholds
for triggering those surge arrangements. Surge arrangements can include, but are not limited to people, hardware,
software and financial resources.
stakeholder engagement and communications (including Board and ministerial liaison, if applicable)
resource and capability demand (including urgent logistics or finance requirements, and human resources
considerations during response effort).
Include details of the SEMT responsible for managing responses to cyber security incidents. The composition and roles
of the SEMT may vary depending on the cyber security incident impact and size and structure of an organisation, as
some roles may not be relevant or multiple roles may be held by the same individual.
respond to potential increases in internal and external enquiries or complaints about the cyber security incident
or the effects, with common questions including:
How will the IT helpdesk (or equivalent) manage enquiries and be supported?
What communication channels are available to affected customers (e.g. telephone hotline, information on
the website or social media)?
communicate externally about the cyber security incident, including to the public and the media:
Who has the primary responsibility for authorising and speaking on behalf of the organisation? How will this
person be supported?
Who has responsibility for producing and approving information for release to the public and media?
monitor news media, social media and other forms of media and use it to support communications.
Include details for backup communication channels to communicate with stakeholders and customers.
Internal communications
Include the process and expected timeframes to communicate relevant cyber security incident information to
personnel (for example, system users, customer service teams, senior executives and the Board).
In internal messaging, consider how to inform personnel about the cyber security incident and support business
continuity. Consider providing:
business continuity options for personnel who are affected by the cyber security incident
Depending on the impact and severity of the cyber security incident, it may be necessary to communicate with:
stakeholders required to support with cyber security incident response activities such as government bodies,
third party cyber security incident response, law enforcement, insurance providers and/or sector organisations
the media and customers seeking information about the cyber security incident, such as the general public,
government bodies, clients, shareholders, suppliers and/or sector organisations.
In external messaging, consider how to inform external stakeholders and customers about the cyber security incident
based upon their role or interest. Consider:
any options or actions for stakeholders affected by the cyber security incident to take
Consider supporting requests for information from interested sector and government bodies following the cyber
security incident for the purpose of information sharing and learning from the experience.
Supporting playbooks
Playbooks are documents that are intended to contain easy to follow instructions to assist in ensuring all appropriate
steps are taken when responding to specific types of cyber security incidents. Include a list of playbooks and their
physical and electronic locations. Example cyber security incidents that may have a playbook are:
The CSIRP could include a process chart of when to report cyber security incidents to relevant government bodies
and/or seek assistance.
Sector arrangements
Include information about the relevant sector arrangements and the process for implementing these arrangements.
Jurisdictional arrangements
Each state/territory jurisdiction has its own cyber security incident response arrangements. Organisations should
contact the relevant government body in their jurisdiction to understand the arrangements that apply.
Include information about the process for reporting to and/or seeking assistance from state/territory law
enforcement.
National arrangements
Include information about the process for reporting to and/or seeking assistance from Federal Government bodies.
For example, Australia’s Cyber Incident Management Arrangements outline the inter-jurisdictional coordination
arrangements and principles when responding to national cyber security incidents.
an organisation with links across multiple jurisdictions being compromised through a cyber security incident
malicious cyber activity affecting critical national infrastructure where the consequences have the potential to
cause sustained disruption of essential services or threaten national security
malicious cyber activity where the cause and potential extent of its geographic impact is uncertain
ASD leads the Australian Government’s response to cyber security incidents. For information on how to report cyber
security incidents to ASD, and to seek advice and assistance, visit ASD’s reporting website.
ASD takes the protection of information seriously. Under the limited use obligation, information voluntarily provided
to ASD about cyber security incidents, potential cyber security incidents or vulnerabilities impacting organisations
cannot be used for regulatory purposes.
Appendix C lists some of the common triage questions ASD will use to assess the severity of a reported cyber security
incident.
Include details about who is responsible for cyber security incident notification and reporting to external entities.
The CSIRP could include a process chart of when to report cyber security incidents to relevant government bodies,
regulators and other external parties.
Insurance
Include relevant details about any insurance policies for cyber security incidents.
effects of the cyber security incident (confidentiality, integrity and availability of systems and their resources)
Classification Description
Critical Over 80% of personnel (or several critical staff/teams) unable to work.
Critical systems offline.
High risk to/definite breach of sensitive client or personal data.
Financial impact greater than $100,000.
Severe reputational damage – likely to impact business long term.
For information about the ASD Cyber Security Incident Categorisation Matrix see Appendix K.
Include core logistical and communications protocols and mechanisms used to support cyber security incident
response. For example:
Investigation questions
To guide cyber security incident response efforts, and understanding of the scope and impact of the cyber security
incident, develop a list of investigation questions. Note, not all questions may be answerable with the data available
and questions may change as investigations progress.
What post-exploitation activity occurred? Have accounts been compromised? What level of privilege was
involved?
Is lateral movement suspected or known? Where has the malicious actor laterally moved to and how?
Has data been accessed or exfiltrated and, if so, what kind of data?
De-escalation to Medium
De-escalation to Low
duration that the containment solution will remain in place (e.g. temporary vs permanent solution).
Documentation
Include processes and procedures for documenting the cyber security incident, including responsible personnel and
timeframes. Refer to Appendix D for a Situation Report Template and Appendix E for a Cyber Security Incident Log
Template.
IP addresses
log files
network diagrams
configuration files
databases
investigation notes
screenshots
What resources are required to resolve the cyber security incident (if not already included in the CSIRT)?
What systems, services or networks will be affected during the remediation process?
The Recovery Plan should detail the approach to recovering IT and/or operational technology (OT) systems, services
and networks once containment and remediation is complete.
How will systems, services and networks be restored to normal operation and in what timeframe?
How will systems, services and networks be monitored to ensure they are no longer compromised and are
functioning as expected?
How will identified vulnerabilities be managed to prevent similar cyber security incidents from occurring in the
future?
Stand down
Include decision making processes and procedures for standing down the CSIRT and SEMT.
Include the processes and procedures for completing a Cyber Security Incident Report, including responsible
personnel and timeframes. Consider creating a Cyber Security Incident Report Template as an appendix to the CSIRP.
Key questions to consider during a post cyber security incident review include:
How could our response be improved for future cyber security incidents?
Refer to Appendix H for more detailed questions to consider in post cyber security incident reviews.
Recommendations that arise from the review can be documented in a corresponding Action Register. Refer to
Appendix I for an Action Register Template.
PPOSTTE model
The PPOSTTE model can assist in reflecting on key elements of the cyber security incident response:
Training
Include training activities, and associated support, required for personnel to effectively undertake their roles when
responding to a cyber security incident.
The post cyber security incident review may identify additional specialised training for personnel involved in cyber
security incident response or general cyber security awareness training for all personnel.
Cyber threat
A cyber threat is any circumstance or event with the potential to harm systems or data.
cybercrime
exploitation of vulnerabilities
ransomware.
A cyber security alert is a notification generated in response to a deviation from normal behaviour. Cyber security
alerts are used to highlight cyber security events.
A cyber security event is an occurrence of a system, service or network state indicating a possible breach of security
policy, failure of safeguards or a previously unknown situation that may be relevant to security.
Examples of cyber security events include (but are not limited to):
An unwanted or unexpected cyber security event, or a series of such events, that either has compromised business
operations or has a significant probability of compromising business operations.
Examples of cyber security incidents include (but are not limited to):
denial-of-service attacks
PREPARATION
Your organisation has a cyber security policy or strategy that outlines your organisation’s approach to
prevention, preparedness, detection, response, recovery, review and improvement. For example, your
☐ organisation has a position on not paying ransoms, reporting cyber security incidents to government,
publicly acknowledging cyber security incidents, and sharing information about cyber security incidents
with trusted industry and government partners.
Personnel involved in managing cyber security incidents have received cyber security incident response
☐ training.
Up-to-date hard copy versions of the CSIRP and playbooks are stored in a secure location (in case of
☐ electronic or hardware failure) and are accessible to authorised personnel.
Specific playbooks to supplement the CSIRP have been developed and define step-by-step guidance for
☐ response actions to common cyber security incidents.
A CSIRT and SEMT, or equivalents, have been identified to manage any responses to cyber security
☐ incidents.
All relevant IT and OT SOPs are documented and have been reviewed or tested in an exercise to ensure
☐ they are current and responsible personnel are aware of their roles and responsibilities.
Arrangements for service providers, including cloud and managed services, to provide and retain logs
☐ have been established and tested to ensure they include useful data which can be provided in a timely
manner.
Log retention mechanisms for critical systems, services and networks have been adequately configured
☐ and tested to ensure that they capture useful data.
Your organisation has internal or third party arrangements and capabilities to detect and analyse cyber
☐ security events/incidents. If these capabilities are outsourced, your organisation has an active service
agreement/contract.
SOPs have been developed, and roles and responsibilities assigned, for use of facilities and
☐ communications technologies in response to cyber security incidents, and these resources are confirmed
as available. This includes for alternative/backup IT-based communication channels.
Cyber security incident logging/records and tracking technologies used to manage any response to cyber
☐ security incidents are confirmed as available and have been tested.
☐ Role cards have been developed for personnel involved in the CSIRT and the SEMT.
Your organisation has internal or third party arrangements and capabilities to monitor cyber threats.
Situational awareness information is collected from internal and external data sources, including:
local system and network traffic and activity logs
☐ news concerning political, social or economic activities that might impact cyber security incident
activity
external feeds on cyber security incident trends, new attack vectors, current attack indicators and new
mitigation strategies and technologies.
SOPs have been developed, and roles and responsibilities assigned, for:
Detection mechanisms which can be used to identify cyber security events/incidents, such as scanning,
sensor and logging mechanisms. These mechanisms require monitoring processes to identify unusual or
suspicious activity commensurate with the potential impact of a cyber security incident.
Common monitoring techniques include:
network and user profiling that establishes a baseline of normal activity which, when combined with
logging and alerting mechanisms, can enable detection of anomalous activity
scanning for the introduction of unauthorised hardware and software
☐ scanning for unauthorised changes to hardware and software configurations
sensors that provide an alert when a measure breaches a defined threshold(s) (e.g. device, server and
network activity)
logging and alerting of access to sensitive data or unsuccessful logon attempts to identify potential
unauthorised access
users with privileged access accounts subject to a greater level of monitoring in light of the heightened
risks involved.
Cyber security incident detection, including self-detected cyber security incidents, notifications received
☐ from service providers or vendors, and notifications received from trusted third parties (e.g. ASD).
Cyber security incident analysis, including how cyber security incidents are to be categorised, classified
☐ and prioritised, and controls related to how data is stored and transmitted.
☐ Activating a CSIRT to manage cyber security incidents, with roles and responsibilities assigned.
SOPs, playbooks and templates have been developed, and roles and responsibilities assigned, for
☐ containment, evidence collection and remediation.
A secure location is available for storing data captured during cyber security incidents, which could be
☐ used as evidence of the malicious actor’s tradecraft, and is ready to be provided to third-party
stakeholders if requested.
COMMUNICATIONS
SOPs, playbooks and templates have been developed to support communicating with internal and
☐ external stakeholders.
SOPs, playbooks and templates for media and communications professionals have been developed, and
☐ roles and responsibilities assigned, to support public and media messaging.
You organisation has assigned a public and media spokesperson who is supported by technical subject
☐ matter experts.
Personnel have been trained to implement communications processes and execute their roles and
☐ responsibilities.
All personnel are cognisant of your organisation’s policy, and their responsibilities, when a cyber security
☐ incident occurs (e.g. exercising discretion, using approved talking points, referring enquiries to the
designated public and media spokesperson).
Processes and procedures are documented to support your organisation to meet its legal and regulatory
requirements on cyber security incident notification and reporting with roles and responsibilities within
☐ your organisation assigned. This includes the processes for obtaining authority to release and share
information.
☐ Processes and procedures are documented for communicating with any cyber insurance providers.
Processes are procedures are documented to support post cyber security incident reviews following the
☐ resolution of cyber security incidents, with Post Cyber Security Incident Review Reports submitted to
management for endorsement.
Processes and procedures are documented to ensure actions following cyber security incidents and/or
☐ exercises are tracked and completed (e.g. within an Action Register).
Who is reporting the cyber security incident? (e.g. CISO, SOC Manager)
What type of cyber security incident is being reported? (e.g. ransomware, denial of service, data breach,
malware)
date/time
effect/event
What impact (if any) will the data breach have on public safety or services?
If applicable under the Notifiable Data Breaches scheme, has it been reported to the OAIC?
Are business as usual operations interrupted? If so, how long before operations will be back to normal?
List the affected systems, services and/or networks; highlight any change
Cyber security incident scope
to scope since the previous log.
List the affected stakeholder(s); highlight any change in impact since the
Cyber security incident impact
previous log entry.
Additional notes
20220330 – 0835hrs SOC identified phishing that resulted in the successful deployment of ransomware to the system.
20220331 – 1455hrs CSIRT collected forensic artefacts (listed in the Evidence Register). An initial investigation has assessed the cyber security incident as ‘High’.
The following systems are currently offline: ...
20220401 – 1150hrs SEMT voted to escalate the cyber security incident to ‘Critical’.
Next actions were agreed to as follows: …
20220402 – 1200hrs Jane Doe – CSIRT – 1 x disk and memory image, XYZ Desktop, ABC Model Stored on hard drive asset number CSIRT team, law
– Head Office Contact Details Number, IP ###.###.###.###, ... ####, in IT Security Office and on enforcement, ASD
network drive H:\...
20220425 – 0900hrs Contain Isolated hosts identified as infected per CSIRT investigation. CSIRT Team Leader In Progress
Post cyber security incident debriefs are useful for capturing observations from personnel directly involved in
managing a cyber security incident and identifying actions to improve how their organisation managed its response, as
well as how the cyber security incident could have been prevented. There are two types of debriefs organisations may
hold after experiencing a cyber security incident: a hot debrief and a formal debrief (also known as a cold debrief).
A hot debrief is held immediately after an organisation has recovered its systems, services or networks from a cyber
security incident. The benefits of holding a hot debrief include:
the team involved in responding to the cyber security incident can provide instant feedback and lessons learned
any urgent issues identified during the cyber security incident can be addressed immediately
personnel involved in the cyber security incident are more likely to recall information and detail as it is still fresh
in their minds.
A formal debrief is held days to weeks after an organisation has recovered its systems, services or networks from a
cyber security incident. The benefits of holding a formal debrief include:
it provides an opportunity to discuss the cyber security incident in detail after it is resolved to gather key
insights, learnings and opportunities for improvement
it provides time between the cyber security incident and debrief allowing emotions to settle, particularly for
stressful cyber security incidents
it ensures all key personnel required for discussions are present, especially senior management who will need to
drive the implementation of actions.
Time
Aim
The aim of the hot debrief is to review the cyber security incident, receive feedback on personnel observations and
insights, and identify any urgent issues requiring immediate action.
Participants
The hot debrief should be led by a facilitator (such as a manager who was involved during the cyber security incident)
and supported by a scribe whose role is to document attendance, key insights and immediate actions. It is
recommended that hot debrief participants include all personnel involved during the detection, response and
recovery phases of the cyber security incident, with upper management excluded (e.g. Chief Executive Officers and
General Managers). This will ensure personnel involved in the cyber security incident can speak openly without fear of
repercussion.
Content
Note, it is essential for the facilitator to remain objective during the discussion, and treat the cyber security incident as
a learning point for all involved, without attributing blame to an individual or team.
Conclusion
At the end of the hot debrief, the facilitator should provide a summary of the discussions to participants who can
confirm whether the key issues and actions were captured. The facilitator should explain the next steps and the
expected timeframes for these.
Time
1–2 hours.
Aim
The aim of the formal debrief is to review the cyber security incident, validate what worked, and produce actions and
assigned responsibilities to improve current arrangements.
Participants
The formal debrief should be led by a facilitator who asks key questions, supported by a scribe to document
attendance, key insights and actions.
non-technical personnel who were involved during the cyber security incident
Content
Questions to consider in the formal debrief can be found in the Post Cyber Security Incident Review Analysis
Template. The facilitator can use this guidance to lead the conversation with the participants while the scribe
documents the discussion directly into the template. The scribe can also use the Action Register Template to
document any actions resulting from the discussion.
Conclusion
At the end of the debrief, a decision should be made about whether additional discussions are required, or if
finalisation of the cyber security incident documentation can be completed. If email correspondence is selected to
disseminate the documentation, an action officer will need to be identified for completing them and circulating them
to staff for endorsement.
Based on the findings of the debriefs, the action officer should complete a draft of the Post Cyber Security Incident
Review Analysis and the Action Register and circulate them to the personnel involved in the debrief for their feedback
and endorsement. Note, it is important that the Action Register details an assigned lead (action officer) for closing out
each action.
Once feedback is received and incorporated, documentation should be sent to an executive staff member (e.g. a Chief
Executive Officer or General Manager) for endorsement. The executive staff member may advise their expectations on
the frequency of progress reporting of agreed actions and nominate a person to lead tracking and reporting.
Personnel involved Names of the individuals involved in resolving the cyber security incident and their
functions(s), including any service providers.
Cyber security incident What impact did the cyber security incident have (e.g. loss of systems, services or
impact networks).
Timeline: Summary of what happened and when. Provides high level areas for improvement.
Protection: Identifies the control mechanisms that were in place at the time of the cyber security incident and
their effectiveness. Establishes how to improve the protection of systems, services and networks.
Detection: Establishes how to reduce the time to identify a cyber security incident. Addresses what detection
mechanisms were in place and how those mechanisms could be improved.
TIMELINE
When was the cyber security When did the organisation identify that a cyber security incident was occurring?
incident acknowledged?
Who discovered the cyber Or who was alerted to it first? How did the discovery or alert happen?
security incident first and
how?
Was the cyber security For example, did the organisation report it to ASD or the OAIC?
incident reported externally?
If yes, when?
What activities were It is easier to do this in a list. For example: Time > Task > Impact.
conducted to resolved the
cyber security incident?
When were they conducted
and what was their impact?
PROPOSED ACTIONS Detail any resulting actions that can be incorporated into the Action Register.
Brief description of action > Proposed Action Officer.
PROTECTION
Any other findings and/or See the PPOSTTE model for guidance.
suggestions for
improvement?
PROPOSED ACTIONS Detail any resulting actions that can be incorporated into the Action Register.
Brief description of action > Proposed Action Officer.
DETECTION
Are there any ways to How could the organisation reduce that time?
improve the ‘time to
detection’?
Are there any additional tools Is there anything from a detection perspective that would help mitigate future
or resources that are cyber security incidents?
required in the future to
detect similar cyber security
incidents?
Any other findings and/or What activities worked well? What activities did not work so well? What could be
suggestions for changed with hindsight?
improvement? See the PPOSTTE model for guidance.
PROPOSED ACTIONS Detail any resulting actions that can be incorporated into the Action Register.
Brief description of action > Proposed Action Officer.
RESPONSE
How was the cyber security What needed to happen for the cyber security incident to be resolved?
incident resolved?
Were any business processes For example, does the organisation have a CSIRP, and was this followed?
and procedures used in
responding to the cyber
security incident?
Were there any escalation Were there any escalation points that the cyber security incident went through?
points?
If there were escalation For example, having to escalate to a Chief Operating Officer to take action on an
points, did they hamper the ongoing cyber security incident had severe timeline impacts for the response.
response or were they at the
appropriate level?
How well did the information What worked well/what did not work well? How could it be improved?
sharing and communications Was there any information that was needed sooner?
work within your
How did the organisation communicate within the IR team, across jurisdictions,
organisation?
across time zones, legal teams and external comms teams?
Were there any media If yes, how did the organisation respond?
enquiries received during the
cyber security incident?
Was media produced during If yes, what was the media that was produced?
the cyber security incident?
Were trained personnel Are there any personnel knowledge and/or skills gaps? What are they?
available to respond? Were there enough resources available to respond?
Any other findings and/or See the PPOSTTE model for guidance.
suggestions for
improvement?
PROPOSED ACTIONS Detail any resulting actions that can be incorporated into the Action Register.
Brief description of action > Proposed Action Officer.
RECOVERY
Were there any media If yes, how did the organisation respond?
enquiries after the cyber
security incident?
Any other findings and/or See the PPOSTTE model for guidance.
suggestions for
improvement?
PROPOSED ACTIONS Detail any resulting actions that can be incorporated into the Action Register.
Brief description of action > Proposed Action Officer.
01 Describe the action in detail. Name of the Date the action Complete Insert date, and any updates Any relevant information relating to
person who will is expected to In progress to progressing the action. closing out the action.
be leading the be completed. Detail any blockers here.
Not yet started
action.
The severity of the cyber security incident informs the type and nature of cyber security incident response and crisis
management arrangements that are activated. Depending on the severity of the cyber security incident, ASD has a
suite of capabilities that it may deploy to support the affected parties. However, ASD determines which capabilities
are appropriate and available given competing priorities. Organisations must not rely on ASD for their ability to
respond to cyber security incidents in an appropriate and timely manner.
The material in this guide is of a general nature and should not be regarded as legal advice or relied on for assistance
in any particular circumstance or emergency situation. In any important matter, you should seek appropriate
independent professional advice in relation to your own circumstances.
The Commonwealth accepts no responsibility or liability for any damage, loss or expense incurred as a result of the
reliance on information contained in this guide.
Copyright
With the exception of the Coat of Arms, the Australian Signals Directorate logo and where otherwise stated, all
material presented in this publication is provided under a Creative Commons Attribution 4.0 International licence
(www.creativecommons.org/licenses).
For the avoidance of doubt, this means this licence only applies to material as set out in this document.
The details of the relevant licence conditions are available on the Creative Commons website as is the full legal code
for the CC BY 4.0 licence (www.creativecommons.org/licenses).
The terms under which the Coat of Arms can be used are detailed on the Department of the Prime Minister and
Cabinet website (www.pmc.gov.au/government/commonwealth-coat-arms).