A fast, organized response in the first day after a breach reduces damage, preserves evidence, and keeps customers informed. This playbook gives MSPs an ordered list of actions to contain threats, evaluate the scope, work with legal and PR, and start recovery without adding noise or confusion.

Immediately isolate affected endpoints and accounts to stop active malicious activity. Disconnect compromised machines or place them in network quarantine and revoke or rotate credentials for impacted users and service accounts. Limit remote access and suspend third‑party integrations until you verify they’re safe. These measures buy time to gather forensic evidence and prevent lateral movement.
Start with systems that host critical data, authentication servers, and public-facing services. Prioritize email, directory services, backups, and any systems handling payments or personal data. Document what you isolate and why—this traceability is essential for audits and insurance claims. Preserve logs and snapshots before making changes where possible.
Identify attack type, entry vector, affected assets, and the timeframe of exposure. Determine whether data was exfiltrated, modified, or encrypted and estimate the number of impacted users or customers. Review authentication logs, firewall records, endpoint telemetry, and any IAM changes. This assessment shapes communication, legal, and remediation priorities.
Notify the client’s executive team, IT leaders, legal counsel, and customer support immediately. Pull in compliance and PR advisors to prepare messaging and regulatory filings. Externally, inform only those customers or partners required by law or contract—avoid broad public statements until you have a factual, approved message. Keep a single point of contact for stakeholder questions to reduce confusion.
Lead with facts, not speculation, and tell affected parties what you know and what you’re doing next. Include clear instructions they should follow, such as password resets or monitoring steps, and provide a timeline for updates. Coordinate language with legal and PR to meet disclosure requirements and protect reputation. Regular, transparent updates reduce churn and calm stakeholders.
Contact law enforcement and regulators when data exposure meets legal thresholds or when advised by counsel. For breaches involving personal data, financial systems, or nation‑state actors, early engagement helps with evidence preservation and can influence legal obligations. Follow mandatory reporting timelines in the applicable jurisdictions and document all communications.
Collect volatile and persistent logs, secure system images, and capture memory dumps if safe to do so. Preserve network traffic captures and central logging data; avoid overwriting or purging evidence during containment. Work with experienced forensic analysts to interpret findings without contaminating the scene. Maintain a forensic chain‑of‑custody log for every collected artifact.
Verify the integrity and isolation of backups before any restore operations. Do not restore from backups that may be infected; scan or sandbox sample restores first. If backups are intact and clean, prioritize recovering critical systems to resume core business functions. Document restoration steps and test service continuity before declaring systems fully operational.
Temporarily suspend or review third‑party accounts and integrations with privileged access. Confirm contracts and active engagements before re‑granting access, and require multi‑factor authentication and least‑privilege permissions. Use vendor management logs to identify which third parties touched affected resources during the incident. Re‑onboard vendors only after a security review and documented approval.
Preserve evidence, document every decision, and follow notification laws and contractual obligations. Engage legal counsel and cyber insurance contacts early to understand liabilities and coverage. Keep detailed timelines, system snapshots, and communication records for potential litigation or regulatory review. Transparent, documented remediation can limit fines and preserve client trust.
Stand up a centralized incident response hub with defined roles: incident commander, forensic lead, communications lead, and remediation lead. Use a single incident ticket or war room to avoid duplicated work and conflicting messages. Share status updates at regular intervals and keep action items tracked with owners and deadlines. Ensure any external specialists have a clear brief and access limited to what they need.
Note gaps in monitoring, delayed detection points, failed access controls, and communication bottlenecks. Record what worked well and what slowed response to create a prioritized remediation plan. Convert findings into actionable changes: tighten IAM policies, enhance endpoint controls, improve backup practices, or run targeted training. Early lessons make future incidents faster and less damaging.
A: Keep systems isolated until forensic analysis confirms they’re clean or a safe remediation path exists. Reconnection should follow documented tests, and restored systems should be monitored for recurrence.
A: No—ransomware negotiations should be handled in consultation with legal counsel, insurance, and law enforcement. Negotiating without expert guidance risks legal and financial consequences.
A: If logs are missing, rely on backups, endpoint telemetry, and network devices for reconstruction. Capture whatever artifacts remain and work with forensic specialists to piece together the timeline.
A: Inform customers as soon as you have verified facts and an approved message from legal and PR. Immediate transparency about impact and mitigation steps is critical to retaining trust.
A: Implement stronger IAM, continuous monitoring, multi‑factor authentication, and regular tabletop exercises. Use post‑incident lessons to harden policies and close identified gaps.
For a practical incident response checklist and tools built for MSPs, see the Palisade incident response resources.