Security Vulnerability Incident Report
1. Reporter Information
Name
Contact Information
Role/Department
2. Incident Details
Date & Time Discovered
System/Location Affected
Description of Vulnerability
How Was It Detected?
Potential Impact
3. Actions Taken
Initial Actions Taken
Containment/Remediation Measures
Current Status
4. Attachments / Additional Information
List of Attachments (if any)
Additional Comments