Incident Management Policy


Document Number: ISMS-POL-INC-01

Classification: L1 — Policy (Domain)

Version: 0.1.0

Effective Date: February 20, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy establishes the framework for detecting, reporting, assessing, responding to, and learning from information security incidents across Cybercraft.

It ensures that security events are handled consistently, evidence is preserved, business impact is minimised, and lessons learned are incorporated into continuous improvement of the ISMS.


2. Scope

2.1 Applicable Incidents

This policy covers all information security incidents affecting:

2.2 Incident Types

CategoryExamples
Identity & AccessCompromised credentials, unauthorised access, MFA bypass, suspicious sign-in
Data BreachUnauthorised data disclosure, accidental sharing, data exfiltration
Malware & EndpointMalware detection, device compromise, non-compliance alert
SaaS & CloudUnauthorised SaaS account activity, configuration change, service compromise
PhysicalCA100 Appliance theft or tampering (if in ISMS scope)
Policy ViolationIntentional or negligent breach of security policies

2.3 Out of Scope


3. Roles and Responsibilities

RolePersonResponsibilities
CEOFarah HerbertFinal authority on business impact decisions, external communication approval (client/regulatory notification)
CISORichard WilliamsEscalation point for Severity 1 incidents, risk acceptance decisions, post-incident review approval
Security Director (Incident Coordinator)Lucas ShinPrimary incident handler: detection, triage, containment, investigation, evidence collection, reporting, post-incident review
All PersonnelAll staffReport suspected incidents within 24 hours, preserve evidence, cooperate with investigation

4. Incident Classification

4.1 Severity Levels

SeverityDefinitionExamplesResponse Time
Severity 1 — CriticalActive breach with confirmed data exposure or system compromiseCompromised admin account, confirmed data exfiltration, ransomwareImmediate (within 1 hour)
Severity 2 — HighConfirmed security event with potential data impactCompromised user account, malware detection on enrolled device, Conditional Access policy bypassWithin 4 hours
Severity 3 — MediumSecurity event requiring investigation, no confirmed impactSuspicious sign-in alert, failed MFA attempts, non-compliant device detectedWithin 24 hours
Severity 4 — LowMinor policy violation or informational eventAccidental file sharing (quickly remediated), minor policy deviationWithin 48 hours

4.2 Escalation Matrix

SeverityIncident CoordinatorCISO NotificationCEO Notification
Severity 1ImmediateImmediateImmediate
Severity 2ImmediateWithin 4 hoursAs needed
Severity 3Within 24 hoursWeekly summaryNot required
Severity 4Within 48 hoursMonthly summaryNot required

5. Incident Lifecycle

🏗️ Incident Response Flow

graph TD
    D["Phase 1\nDetection & Reporting"] --> T["Phase 2\nTriage & Assessment"]
    T --> C["Phase 3\nContainment & Response"]
    C --> I["Phase 4\nInvestigation &\nEvidence Collection"]
    I --> R["Phase 5\nRecovery & Remediation"]
    R --> L["Phase 6\nPost-Incident Review\n(Lessons Learned)"]
    L -->|"Improvement actions"| D

5.1 Phase 1 — Detection & Reporting

Automated detection sources:

SourceDetection Scope
Microsoft Defender for BusinessEndpoint threat alerts (malware, suspicious behaviour)
Entra ID Identity ProtectionRisky sign-in and risky user alerts
Conditional AccessPolicy failure and block events
IntuneDevice non-compliance alerts
Microsoft 365 Unified Audit Log (UAL)Suspicious user and admin activity

Manual reporting:

5.2 Phase 2 — Triage & Assessment

Upon receiving a report or alert, the Security Director shall:

  1. Verify the event — confirm whether it is a genuine security incident or a false positive
  2. Classify the severity (per §4.1)
  3. Assess scope — determine affected users, data, and systems
  4. Escalate per the escalation matrix (§4.2)
  5. Document initial assessment in the Incident Register (§7)

5.3 Phase 3 — Containment & Response

Containment actions are proportionate to severity and may include:

ActionTool / MethodWhen Applied
Account disable / password resetEntra IDCompromised credentials
Selective WipeIntuneDevice compromise (BYOD)
Revoke active sessionsEntra IDSuspicious sign-in
Block sign-inConditional AccessRisky device/user
SaaS account suspensionPer-app admin consoleThird-party service compromise
Isolate deviceDefender for BusinessMalware detection
BYOD-specific incident response procedures are detailed in Monitoring & Incident Response Procedure.

5.4 Phase 4 — Investigation & Evidence Collection

The Security Director shall:

  1. Collect evidence from relevant sources:
      • Entra ID sign-in and audit logs
      • Microsoft Defender incident reports
      • Intune compliance and audit logs
      • M365 Unified Audit Log (UAL)
      • SaaS provider audit logs (where available)
  2. Preserve evidence — export logs with timestamps and store securely in a designated M365 Private Channel (Confidential classification)
  3. Maintain chain of custody — document who accessed evidence, when, and for what purpose
  4. Timeline reconstruction — build a chronological sequence of events from first indicator to detection

5.5 Phase 5 — Recovery & Remediation

  1. Restore affected services and accounts to normal operation
  2. Verify containment effectiveness — confirm the threat is eliminated
  3. Re-enable blocked accounts/devices after verification
  4. Implement immediate compensating controls if root cause cannot be immediately resolved
  5. Communicate resolution to affected parties

6. Post-Incident Review (Lessons Learned)

📝
Every Severity 1 and Severity 2 incident requires a formal Post-Incident Review. Severity 3–4 incidents are reviewed in aggregate during quarterly management reviews.

6.1 Review Process

StepActionTimelineOwner
1Schedule Post-Incident Review meetingWithin 5 business days of incident closureSecurity Director
2Prepare incident timeline, root cause analysis, and impact summaryBefore meetingSecurity Director
3Conduct review with CISO (and CEO for Severity 1)As scheduledSecurity Director + CISO
4Document lessons learned, root cause, and improvement actionsWithin 2 business days of meetingSecurity Director
5CISO approves Post-Incident Review reportWithin 5 business daysCISO
6Track improvement actions to completionOngoingSecurity Director

6.2 Review Outputs

Each Post-Incident Review shall produce:

6.3 Aggregate Review


7. Incident Register

The Security Director shall maintain an Incident Register recording:

The Incident Register is stored in a Confidential M365 Private Channel accessible only to the Security Director and CISO.


8. External Notification

8.1 Client Notification

If an incident affects client data:

8.2 Regulatory Notification

8.3 Law Enforcement


9. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.5.24Information security incident management planning and preparation§3 (Roles), §4 (Classification), §5.1 (Detection sources), §7 (Register)
A.5.25Assessment and decision on information security events§4 (Severity classification), §5.2 (Triage & Assessment)
A.5.26Response to information security incidents§5.3 (Containment), §5.5 (Recovery)
A.5.27Learning from information security incidents§6 (Post-Incident Review — Lessons Learned)
A.5.28Collection of evidence§5.4 (Investigation & Evidence Collection)

10. Document Control

VersionDateAuthorChanges
0.1.02026-02-20Lucas ShinInitial release — incident classification (4 severity levels), lifecycle (6 phases including lessons learned), escalation matrix, evidence collection, post-incident review, incident register, external notification (client/regulatory/law enforcement)

Review Schedule


[End of Policy Document]