Incident Response: What It Is, How to Build a Plan, and What B2B Companies Must Know
2026-03-07
By Orbiq Team

Incident Response: What It Is, How to Build a Plan, and What B2B Companies Must Know

A practical guide to incident response — what it involves, how to build an incident response plan, the phases of handling security incidents, regulatory requirements under NIS2, DORA, and ISO 27001, and how to communicate incidents to customers and regulators.

Incident Response
Security Incidents
Breach Management
Compliance
NIS2
DORA
ISO 27001

Incident Response: What It Is, How to Build a Plan, and What B2B Companies Must Know

Incident response is the structured process an organisation uses to detect, contain, investigate, and recover from security incidents. Every organisation that handles data will eventually face an incident — whether a phishing compromise, a misconfigured cloud service, a ransomware attack, or an insider threat.

For B2B SaaS companies, incident response capability is both an operational necessity and a compliance requirement. Enterprise buyers expect documented incident response procedures in vendor assessments. Regulatory frameworks — GDPR, NIS2, DORA, ISO 27001 — mandate specific incident handling and notification processes. The difference between a managed incident and a crisis often comes down to preparation.

This guide covers how to build an incident response programme, the phases of handling incidents, regulatory notification requirements, and how to communicate incidents to customers.


Incident Response Fundamentals

What Constitutes a Security Incident

A security incident is any event that compromises or threatens the confidentiality, integrity, or availability of information systems or data. Examples include:

CategoryExamples
Data breachesUnauthorised access to personal data, exfiltration of customer records
Malware and ransomwareEncryption of systems, cryptomining, backdoor installation
Account compromiseStolen credentials, session hijacking, privilege escalation
Denial of serviceVolumetric DDoS, application-layer attacks, resource exhaustion
Insider threatsMalicious data theft, accidental data exposure, policy violations
Supply chain compromiseCompromised third-party software, vulnerable dependencies
Cloud misconfigurationExposed storage buckets, overly permissive IAM, unencrypted data

Incident vs Event vs Vulnerability

TermDefinitionExample
Security eventAn observable occurrence in a system or networkFailed login attempt
Security incidentAn event that compromises security or violates policySuccessful brute force leading to data access
VulnerabilityA weakness that could be exploitedUnpatched software, weak password policy

Not every event is an incident, and not every vulnerability leads to one. Effective triage distinguishes between noise and genuine incidents that require response.


The Incident Response Lifecycle

NIST Framework (SP 800-61)

The NIST Computer Security Incident Handling Guide defines four phases:

Phase 1: Preparation

Preparation happens before incidents occur:

  • Establish an Incident Response Team (IRT) with defined roles
  • Document incident response procedures for common scenario types
  • Deploy detection and monitoring tools (SIEM, EDR, network monitoring)
  • Create communication templates for internal and external notifications
  • Establish relationships with external parties (legal counsel, forensics providers, law enforcement, CERTs)
  • Conduct tabletop exercises and simulations
  • Ensure logging is comprehensive and tamper-resistant

Phase 2: Detection and Analysis

Identifying that an incident has occurred and understanding its scope:

  • Monitor security alerts from SIEM, IDS/IPS, EDR, and cloud security tools
  • Analyse anomalies in logs, network traffic, and user behaviour
  • Correlate events across multiple data sources
  • Determine incident severity and classify according to your taxonomy
  • Document initial findings and timeline
  • Notify relevant stakeholders according to escalation procedures

Phase 3: Containment, Eradication, and Recovery

Stopping the incident, removing the threat, and restoring operations:

  • Short-term containment: Isolate affected systems to prevent spread (network segmentation, account suspension, firewall rules)
  • Evidence preservation: Capture forensic images, preserve logs, maintain chain of custody
  • Long-term containment: Apply temporary fixes to allow continued operations while preparing full remediation
  • Eradication: Remove malware, close attack vectors, patch vulnerabilities, reset compromised credentials
  • Recovery: Restore systems from clean backups, verify integrity, monitor for re-infection
  • Validation: Confirm the threat is eliminated and systems are operating normally

Phase 4: Post-Incident Activity

Learning from the incident to improve future response:

  • Conduct a post-incident review (blameless post-mortem)
  • Document the complete incident timeline
  • Identify root causes and contributing factors
  • Determine what worked well and what needs improvement
  • Update incident response procedures based on lessons learned
  • Track remediation actions to completion
  • Share relevant findings (anonymised if needed) with industry peers

Building an Incident Response Plan

Incident Classification

Define clear severity levels with objective criteria:

SeverityCriteriaResponse TimeExamples
Critical (P1)Active data breach, system-wide outage, ransomwareImmediate (< 1 hour)Customer data exfiltrated, production encrypted
High (P2)Significant compromise, partial service impact< 4 hoursAccount takeover, malware on server, targeted phishing success
Medium (P3)Contained compromise, limited impact< 24 hoursSingle workstation malware, policy violation, suspicious activity
Low (P4)Minor event, no confirmed compromise< 72 hoursPhishing email reported (no click), port scan detected

Incident Response Team Roles

RoleResponsibility
Incident CommanderOverall coordination, decision-making, escalation
Technical LeadTechnical investigation, containment, and remediation
Communications LeadInternal and external communications, media handling
Legal CounselRegulatory notification requirements, evidence preservation, liability
Executive SponsorBusiness decisions, resource allocation, stakeholder management
Forensics AnalystEvidence collection, malware analysis, root cause determination
OperationsSystem restoration, backup management, service continuity

Communication Plan

Internal communication:

  • Escalation matrix with contact details (phone, not just email)
  • War room or incident channel setup procedures
  • Status update cadence (every 2-4 hours during active incidents)
  • Need-to-know classification for sensitive incident details

External communication:

  • Regulatory notification templates (GDPR 72-hour, NIS2 24-hour, DORA 4-hour)
  • Customer notification templates (affected vs potentially affected)
  • Media holding statement and spokesperson designation
  • Law enforcement engagement criteria and procedures

Regulatory Incident Reporting Requirements

GDPR (Articles 33-34)

RequirementDetail
Who reportsData controller to supervisory authority
DeadlineWithin 72 hours of becoming aware
ThresholdBreaches likely to result in risk to individuals' rights
Individual notificationRequired if high risk to individuals (Article 34)
Processor obligationNotify controller without undue delay

NIS2 (Article 23)

RequirementDetail
Early warningWithin 24 hours of becoming aware of a significant incident
Incident notificationWithin 72 hours with initial assessment
Intermediate reportsUpon request from CSIRT or competent authority
Final reportWithin one month of incident notification
ThresholdSignificant operational disruption or financial loss

DORA (Articles 17-19)

RequirementDetail
Initial notificationWithin 4 hours of classification (or 24 hours of detection)
Intermediate reportWithin 72 hours of classification
Final reportWithin one month of last intermediate report
Classification criteriaAffected clients, duration, geographical spread, data losses
Voluntary reportingSignificant cyber threats may be reported voluntarily

ISO 27001

ControlRequirement
A.5.24Establish incident management planning and preparation
A.5.25Assess and decide on security events
A.5.26Respond according to documented procedures
A.5.27Learn from incidents to improve security
A.5.28Collect and preserve evidence properly
A.6.8Provide a mechanism for reporting security events

Incident Response for B2B SaaS Companies

SaaS-Specific Considerations

Multi-tenant impact: An incident in a multi-tenant platform can affect all customers simultaneously. Your plan must address tenant isolation, cross-tenant impact assessment, and per-customer notification.

Shared responsibility: Cloud infrastructure incidents may involve your cloud provider (AWS, Azure, GCP). Clarify responsibilities and escalation paths with providers in advance.

Data processor obligations: As a data processor under GDPR, you must notify your customers (controllers) without undue delay so they can meet their own 72-hour notification deadline to supervisory authorities.

API and integration security: Incidents involving APIs or integrations may affect downstream systems. Identify dependencies and notification obligations for connected services.

Continuous deployment: Rapid release cycles can introduce vulnerabilities. Your incident response plan should cover incidents arising from deployments (rollback procedures, feature flag kill switches).

Customer Communication During Incidents

Best practices for B2B incident communication:

  1. Notify promptly — Direct communication to affected customers, not just a status page update
  2. Be factual — State what you know, what you do not know, and what you are investigating
  3. Avoid speculation — Do not guess about attribution, scope, or impact before investigation confirms it
  4. Provide actionable guidance — Tell customers what they need to do (rotate credentials, review access logs, notify their own users)
  5. Give regular updates — Set expectations for update frequency and honour them
  6. Publish a post-incident report — Timeline, root cause, remediation actions, and improvements planned

Testing Your Incident Response

Tabletop Exercises

Scenario-based discussions where the IRT walks through hypothetical incidents:

  • No actual systems are affected
  • Focus on decision-making, communication, and procedure validation
  • Typical duration: 2-4 hours
  • Recommended frequency: quarterly
  • Include scenarios relevant to your technology and threat landscape

Functional Exercises

Hands-on exercises that test specific technical capabilities:

  • Restore from backup within recovery time objectives
  • Isolate a compromised system from the network
  • Conduct forensic analysis of a simulated compromise
  • Execute communication procedures (internal and external)
  • Recommended frequency: twice annually

Full-Scale Simulations

End-to-end exercises that test the complete incident response process:

  • Simulated attack with real (but controlled) technical activity
  • Tests detection capabilities — can your team identify the incident?
  • Includes executive communication and external notification procedures
  • Recommended frequency: annually
  • Consider engaging a red team to increase realism

Common Incident Response Mistakes

No Plan Until the First Incident

Building incident response procedures during an active incident leads to chaos. The time to plan is before the incident — not during. Even a basic documented plan dramatically improves response effectiveness.

Insufficient Logging

You cannot investigate what you did not log. Ensure comprehensive logging across applications, infrastructure, authentication systems, and network boundaries. Retain logs for at least 12 months (many regulations require longer).

Destroying Evidence

Well-meaning IT staff who immediately reimage compromised systems destroy forensic evidence needed for investigation and regulatory reporting. Train staff on evidence preservation before remediation.

Communication Failures

Internal communication breakdowns during incidents cause duplicate effort, conflicting actions, and missed notifications. External communication failures — delayed, inconsistent, or misleading customer notifications — destroy trust faster than the incident itself.

Skipping Post-Incident Reviews

Every incident, even minor ones, offers learning opportunities. Organisations that skip post-incident reviews repeat the same mistakes. Make post-incident reviews mandatory and blameless.


How Orbiq Supports Incident Response

  • Trust Center: Publish your incident response posture, post-incident reports, and remediation status for customer transparency
  • Continuous Monitoring: Track incident response controls across ISO 27001, NIS2, and DORA requirements
  • Evidence Management: Centralize incident records, post-mortem documentation, and exercise reports mapped to compliance frameworks
  • AI-Powered Questionnaires: Auto-respond to incident response questions in security questionnaires from your documented procedures

Further Reading


This guide is maintained by the Orbiq team. Last updated: March 2026.