Network Intrusion Documentation
General Information
Date/Time Discovered
Reported By
Location / System(s) Affected
Incident Description
Summary of Incident
Indicators of Compromise
Detection Details
How was the intrusion detected?
Detection Tool(s) Used
Response Actions
Actions Taken
Escalation / Notifications
Impact Assessment
Data/Systems Affected
Potential Impact
Lessons Learned & Recommendations
Root Cause Analysis
Recommendations
Additional Notes