PlaybookGLOBAL

ISO 27035 Incident Response Playbook

A step by step incident response playbook aligned to the ISO/IEC 27035 series.

Built for speed, decision clarity, evidence quality, and clean handoffs between management and technical responders.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
8

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

The ISO/IEC 27035 series expects incident response to be run through structured intake, assessment, response operations, and learning. This playbook translates that into a usable operating sequence with defined forms, roles, escalation points, and evidence requirements.

Section 1

Phase 0: prepare the command structure before the incident

Part 2 makes planning and preparation a first class activity. That means the playbook should already name the IMT, IRT, incident coordinator, point of contact, external support paths, and approval authorities before the first event arrives.

If these choices are made during the incident, the response is already behind.

  • Publish role ownership and delegation rules
  • Maintain external support contacts for legal, forensics, providers, CERTs, regulators, and communications
  • Keep the capability register and the playbook version current
Recommended next step

Turn ISO 27035 Incident Response Playbook into an operational assessment

Assessment Autopilot can take ISO 27035 Incident Response Playbook from operationalizing response workflows and review cycles to a reusable workflow inside Sorena. Teams working on ISO 27035 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 2

Phase 1: detect and report with a usable event form

Part 2 expects an event report form and criteria for accepting a report based on completeness. Reports should be completed immediately when a suspected event may cause substantial loss or damage to the organization.

The goal is not a perfect report. The goal is a report that is complete enough to support routing and early assessment.

  • Capture reporter, time, suspected event type, affected asset or service, observed impact, and contact path
  • Define what makes a report acceptable for triage and how missing information is chased down
  • Record the intake channel and handoff time to the PoC or triage owner
Section 3

Phase 2: assess and decide using the classification scale

Part 1 and Part 2 both expect organizations to decide whether an event is an incident and to do so within predetermined time frames. The incident coordinator should use the classification scale, affected service context, and severity logic to set the response path.

This decision should be logged, not inferred later from chat history.

  • Classify the event type and affected resource
  • Assign severity, priority, and escalation level
  • Document who decided, when they decided, and what evidence they used
Section 4

Phase 3: triage and analysis

Part 3 provides operational guidance for triage and analysis. The objective is to verify scope, understand what happened, and preserve evidence and analysis results in a way that supports later investigation and recovery.

Analysis depth should match the incident severity and the need for containment speed.

  • Confirm scope, affected systems, affected users, and likely propagation path
  • Preserve volatile and durable evidence where needed for forensics or legal follow-up
  • Keep analysis results in a location that can be referenced from the incident log
Section 5

Phase 4: containment

Containment is about preventing the incident from growing while protecting recovery options and investigation quality. Part 3 specifically distinguishes containment from eradication and recovery, which matters because each phase has different tradeoffs.

Containment decisions should be explicit, because the fastest action is not always the best action.

  • State the containment goal before executing the action
  • Record the containment strategy chosen and the rejected alternatives if the decision was material
  • Track any customer, business, or legal impacts caused by the containment step itself
Section 6

Phase 5: eradication and recovery

Eradication removes the root cause or the active foothold. Recovery restores normal operation safely. Part 3 expects these to be treated as separate operational concerns.

Do not declare recovery complete until integrity and service objectives have been checked.

  • Record the root cause removal method and validation checks
  • Restore systems with explicit integrity and readiness criteria
  • Log any residual risk accepted at service restoration time
Section 7

Phase 6: communications and information sharing

Part 2 expects rules and circumstances for internal and external information sharing. It also points to the need for legal review and for recognized information marking approaches such as traffic light protocol if your organization adopts them.

Communications should be consistent with the classification policy and should not rely on improvised executive updates.

  • Use a fixed update cadence per severity level
  • Predefine who can notify customers, regulators, providers, CERTs, or law enforcement
  • Mark shared information according to your approved disclosure model
Section 8

Phase 7: close, learn, and improve

Part 2 expects lessons learned, IMT evaluation, plan improvement, control improvement, and risk review where incident reality differs from prior assumptions. Closure should therefore produce more than a closed ticket status.

The post-incident phase is where the incident becomes useful to the organization.

  • Complete the post-incident review and link corrective actions to owners and deadlines
  • Update the plan, forms, or team structure where the response exposed weaknesses
  • Review whether the incident changes risk ratings, control design, or training needs
Primary sources

References and citations

Related guides

Explore more topics