Skip to content
TECHNOMATON | Docs SAI Certified Trainers

Incident Management

Version: 1.0 | Effective from: 1 January 2026


1. Purpose

This directive defines the process for managing security incidents, including detection, response, notification, and recovery.


2. Incident Definition

2.1 Incident types

TypeExamplesRegulation
Data BreachData leak, unauthorized accessGDPR
Security IncidentMalware, ransomware, intrusionNIS2
AI IncidentBias, hallucination, malfunctionAI Act
AvailabilityDDoS, system failureNIS2
CompliancePolicy violationInternal

2.2 Severity Classification

SeverityDefinitionResponse TimeEscalation
CriticalBusiness critical impact, data breach<1hCEO + Board
HighSignificant impact, potential breach<4hC-level
MediumLimited impact, contained<24hManagement
LowMinimal impact, no data at risk<72hTeam lead

3. Incident Response Team (IRT)

3.1 Team composition

RolePrimaryBackup
Incident CommanderCISOIT Director
Technical LeadSecurity EngineerSRE Lead
CommunicationsPR ManagerCEO
LegalCLOExternal counsel
DPODPOPrivacy consultant
BusinessCOODepartment head

3.2 Contact information


4. Incident Response Process

4.1 Response phases


5. Notification Requirements

5.1 Internal Notification

SeverityNotifyTimeline
CriticalCEO, Board, All C-levelImmediate
HighCISO, CTO, relevant C-level<1h
MediumCISO, Team leads<4h
LowCISO<24h

5.2 External Notification (Regulatory)

RegulationAuthorityTimelineTrigger
GDPRNational DPA72hPersonal data breach
NIS2National CSIRT24h (initial), 72h (full)Significant incident
AI ActDocumentAI incident

5.3 Notification Templates

Initial Notification (24h) — National CSIRT:

  • Incident ID
  • Detection time
  • Affected systems
  • Initial assessment
  • Containment status
  • Contact info

Full Report (72h) — National DPA:

  • Nature of breach
  • Categories of data
  • Number of subjects
  • Likely consequences
  • Measures taken
  • DPO contact

6. Data Breach Specific Process

6.1 Data Breach Assessment

Data Breach Checklist:

  • What happened?
  • When was it discovered?
  • When did it start?
  • What data is affected?
  • How many data subjects are affected?
  • Is the data encrypted?
  • Was the key compromised?
  • What is the risk to data subjects?
  • Is notification required?

6.2 Subject Notification Criteria

Notify data subjects if:

  • High risk to rights and freedoms
  • Unencrypted sensitive data
  • Financial data exposed
  • Health data exposed
  • Credentials exposed (plaintext)

6.3 Subject Notification Content

  • What happened (without technical details)
  • What data was affected
  • What is the risk
  • What we are doing
  • What you can do
  • DPO contact

7. AI Incident Specific Process

7.1 AI Incident Types

TypeExampleSeverity
BiasDiscriminatory outputsHigh
HallucinationFactually incorrectMedium
Privacy leakPII in outputsCritical
MalfunctionSystem not workingMedium
AdversarialModel manipulationHigh

7.2 AI Incident Response


8. Communication

8.1 Internal Communication

AudienceChannelFrequency
IRTWar room / SlackContinuous
ManagementEmail + callEvery 4h (critical)
EmployeesEmailAs needed

8.2 External Communication

AudienceResponsibilityApproval
RegulatorsDPO / CISOCLO
CustomersPR + CSCEO
MediaPRCEO
PartnersAccount managerCOO

8.3 Communication Templates

Internal Status Update:

Subject: [INCIDENT-XXX] Status Update #N
Current Status: [ACTIVE/CONTAINED/RESOLVED]
Severity: [CRITICAL/HIGH/MEDIUM/LOW]
Summary: [2-3 sentences]
Timeline:
- [Time]: [Event]
- [Time]: [Event]
Current Actions:
- [Action 1]
- [Action 2]
Next Update: [Time]
Incident Commander: [Name]

9. Documentation

9.1 Incident Record

Every incident must contain:

FieldDescription
Incident IDUnique identifier
Detection timeWhen discovered
Start timeWhen it started (estimate)
End timeWhen resolved
SeverityClassification
TypeData breach / Security / AI
DescriptionWhat happened
ImpactWhat was the impact
Root causeCause
Actions takenWhat we did
Lessons learnedWhat to improve
Follow-up actionsPreventive measures

9.2 Retention

DocumentRetention
Incident report5 years
Evidence5 years
Communication logs5 years
Forensic reports5 years

10. Post-Incident Review

10.1 Post-Mortem Template

POST-MORTEM: [INCIDENT-XXX]
1. INCIDENT SUMMARY
- What happened
- Timeline
- Impact
2. ROOT CAUSE ANALYSIS
- What failed
- Why it failed
- Contributing factors
3. WHAT WENT WELL
- Effective responses
- Good decisions
4. WHAT COULD BE IMPROVED
- Gaps identified
- Process issues
5. ACTION ITEMS
- Preventive measures
- Process improvements
- Training needs
- Tool improvements
6. FOLLOW-UP
- Owner for each action
- Deadlines
- Review date

11. Training & Exercises

ExerciseFrequencyScope
Tabletop exerciseQuarterlyIRT
Phishing simulationQuarterlyAll employees
IR drillSemi-annuallyIRT + IT
Full-scale exerciseAnnuallyOrganization-wide

12. Policy Review

  • After each incident: Review lessons learned
  • Quarterly: Metrics review, process update
  • Annually: Full policy review + CISO approval

Next review: Q2 2026