Incident Decision Log
Audience : Incident Commander, SOC Manager, IR Engineer, CISO
Purpose : Use this template to record key incident decisions, who made them, what facts supported them, and what follow-up was required.
graph TD
A["Incident Fact or Escalation"] --> B["Record Decision Point"]
B --> C["Capture Owner and Rationale"]
C --> D["Track Action Taken"]
D --> E["Review During Closure"]
1. When to Use This Template
2. Incident Overview
Field
Value
Incident ID
INC-[YYYYMMDD]-[001]
Incident Type
Severity
☐ Critical · ☐ High · ☐ Medium · ☐ Low
Incident Commander
Date Opened
3. Decision Log
Time (UTC)
Decision
Decision Owner
Facts Available
Risk / Tradeoff
Action Taken
4. Mandatory Decision Points
Whether to contain immediately or continue observation.
Whether to isolate hosts, disable accounts, block traffic, or pause service.
Whether to notify executives, legal, privacy, customers, or regulators.
Whether to recover service before full root cause confidence.
Whether to restore, rollback, reconnect, or re-enable access before all remediation is complete.
5. Decision Authority Quick Reference
Decision Type
Usual Approver
Escalate Further When
Immediate containment
Tier 2 / Incident Commander
Business impact or evidence-destruction risk increases
Service interruption / shutdown
Business owner + CISO
Material revenue, safety, or regulatory impact exists
Legal / privacy / regulator notification
DPO / Legal / CISO
Notification scope is uncertain or multi-jurisdictional
Customer / public communication
Delegated executive after Legal + Communications review
Public pressure, media inquiry, or board visibility increases
Restore / rollback / return-to-service
Service owner + Incident Commander
Data consistency, customer impact, or rollback risk remains unclear
Residual risk acceptance
CISO + business owner
Risk exceeds management authority or remains High
6. Minimum Evidence for a Decision
7. Evidence Hold / Retention Decisions
Decision Type
Owner
Required Fact Pattern
Start legal hold
Legal / DPO / CISO
Regulated data, board-level sensitivity, litigation risk, or law-enforcement involvement
Move evidence to archive
IR Lead / evidence custodian
Analysis complete, hash verified, retention basis confirmed
Approve release or destruction
Legal + evidence custodian
Hold cleared, retention period met, disposal authority confirmed
8. Restoration / Rollback Decisions
Decision Type
Owner
Evidence Gate
Follow-up Required
Restore from backup / snapshot
IT Ops + service owner
Restore source trusted, recovery point accepted, validation owner named
Enhanced monitoring and business validation
Rollback release / configuration
Service owner + change owner
Prior state verified, rollback window approved, security impact reviewed
Confirm vulnerability or defect is not reintroduced
Reconnect service / host / integration
Infrastructure owner + Incident Commander
Asset is clean, controls active, reconnect scope bounded
Watch for recurrence and confirm partner/service owner acceptance
Return to production / re-enable business process
Business owner + CISO for material cases
Service works as intended, residual risk accepted, rollback path retained
Review in closure report and next governance cycle if risk remains open
9. Closure Review
Question
Answer
Which decision created the highest risk?
Which decision most reduced impact?
Was any decision made with incomplete data?
What control or process change would improve future decisions?
References