Unauthorized Access Security Report
Incident Overview
Date & Time of Incident
Reported By
Location/System Affected
Incident Details
Description of Unauthorized Access
How was the incident detected?
Impact Assessment
Data/Assets Affected
Estimated Impact
Actions Taken
Immediate Response
Further Actions Required
Follow-up & Recommendations