Internal System Intrusion Attempt
Date/Time of Incident
Location / System Affected
Reported By
Description of Incident
Indicators of Compromise (IoC)
Detection Method
System/User Impacted
Immediate Actions Taken
Further Analysis / Investigation
Current Status
Follow-up Actions & Recommendations
Incident Handler
Reviewed By
Date Closed