{"id":43969,"date":"2020-03-19T15:56:24","date_gmt":"2020-03-19T15:56:24","guid":{"rendered":"https:\/\/www.n-able.com\/?p=43969"},"modified":"2023-03-22T09:28:46","modified_gmt":"2023-03-22T09:28:46","slug":"how-it-documentation-relates-to-incident-response","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response","title":{"rendered":"How IT Documentation Relates to Incident Response"},"content":{"rendered":"<p>\u201cDear Network User,\u201d the email begins. \u201cWe regret to inform you that your MyCompany account has been suspended. Please follow the link below to update your account.\u201d It seems legitimate, your customer thinks. After all, \u201cMyCompany\u201d is the name of their organization. They click the link and\u2014just like that\u2014they\u2019ve opened the door for malware, allowing it to begin infiltrating the entire network.<\/p>\n<p>As a managed services provider (MSP), it\u2019s your responsibility to immediately jump into action. That means turning to your cybersecurity IT incident response plan to guide you through.<\/p>\n<h2><strong>What is an incident response plan?<\/strong><\/h2>\n<p>An IT incident response plan is a documented process for dealing with a cyberattack. With the right plan in place, MSPs can quickly identify where a breach occurred, what systems were affected, and how they should respond to eradicate the malware.<\/p>\n<p>So why do you need an incident response plan? While a security-savvy company will rely on preventative practices\u2014updating their antivirus software, putting appropriate patches in place, or running daily backups\u2014to protect against a cyberattack, there is always a chance of an attack slipping through the cracks.<\/p>\n<p><a href=\"https:\/\/apwg.org\/trendsreports\/\" target=\"_blank\" rel=\"noopener\">According to recent reports<\/a>, the number of phishing attacks rose in the third quarter of 2019 to a level not seen since late 2016. What\u2019s more, a <a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">2019 report found that 43% of all cyberattacks are targeted at small businesses<\/a>. These startling statistics make a strong case in favor of adopting a robust incident response plan that helps ensure MSPs know exactly how to proceed if their customers fall victim to a cyberattack.<\/p>\n<h2><strong>How to create an incident response plan<\/strong><\/h2>\n<p>The number of incident response steps included in an incident response plan can vary from company to company, but typically these <a href=\"https:\/\/www.solarwindsmsp.com\/resources\/eb-creating-incident-response-plan\" target=\"_blank\" rel=\"noopener\">plans <\/a>resemble some form of the following:<\/p>\n<ol>\n<li><strong>Preparation: <\/strong>This introductory phase sets the scene for all the steps to follow. During the preparation phase, MSPs work alongside each of their customers to put a robust incident response plan in writing. Together, they set expectations, define incident response roles and responsibilities, and identify business-critical services, applications, and data.<\/li>\n<li><strong>Identification: <\/strong>Once an incident is detected, MSPs will usually be made aware of it via an alarm from a threat monitoring solution or log data. From there, MSPs must work with their customers to understand and classify it. That means asking questions like, \u201cIs this a first-time occurrence or has this incident occurred before?\u201d and \u201cWhen did the event happen, how was it discovered, and by whom?\u201d<\/li>\n<li><strong style=\"background-color: transparent;font-size: 1em\">Containment: <\/strong><span style=\"background-color: transparent;font-size: 1em\">Once MSPs understand the issue, it\u2019s time to quarantine any affected systems. The goal is to protect the infrastructure from further infection while also working to keep critical systems (identified in the preparation phase) up and running. Once contained, it\u2019s important for MSPs to spend time analyzing the incident. That means identifying the entry point, who the attacker was, which accounts were compromised, what data was accessed, and so on.<\/span><\/li>\n<li><strong style=\"background-color: transparent;font-size: 1em\">Eradication:<\/strong><span style=\"background-color: transparent;font-size: 1em\"> After analyzing what happened and why, it\u2019s time for MSPs to start working on removing the threat from the computer or network. This might involve running an antivirus program, deleting software, or <a href=\"https:\/\/www.n-able.com\/features\/patch-management\" target=\"_blank\" rel=\"noopener\">adding a critical patch<\/a><\/span><span style=\"background-color: transparent;font-size: 1em\">. <\/span><\/li>\n<li><strong style=\"background-color: transparent;font-size: 1em\">Recovery: <\/strong><span style=\"background-color: transparent;font-size: 1em\">Once you remove the problem, it\u2019s time to restore systems to full <a href=\"https:\/\/www.n-able.com\/blog\/business-continuity-plans\" target=\"_blank\" rel=\"noopener\">business continuity<\/a><\/span><span style=\"background-color: transparent;font-size: 1em\">. That means working from backups or rebuilding a full system or network. <\/span><\/li>\n<li><strong style=\"background-color: transparent;font-size: 1em\">Review: <\/strong><span style=\"background-color: transparent;font-size: 1em\">During this final stage, MSPs work with their customers to discuss and document answers to questions surrounding what happened, what actions were taken, what went well, and what could be improved. <\/span><\/li>\n<\/ol>\n<h2><strong>IT documentation\u2014a crucial component of incident response<\/strong><\/h2>\n<p>Having a secure, standard system for documenting all breach-related data (the who, what, when, where, and how) during an incident response process is crucial. These documentation systems empower MSPs and their customers to:<\/p>\n<p><strong>Better prepare for the future:<\/strong> By reviewing notes pertaining to what went wrong\u2014and what went right\u2014MSPs are armed with the insights they need to adjust their incident response plan accordingly. In most cases, certain steps are updated to better prepare for future attacks, while steps that proved their worth remain.<\/p>\n<p><strong>Remain compliant:<\/strong> Many MSPs deal with customers who have to comply with strict industry regulations. For example, any company that deals with the personal data of European Union residents must comply with the General Data Protection Regulation (GDPR) requirements. According to the GDPR, companies may be required to report a breach [if it is likely to put EU citizens\u2019 personal data at risk. As part of this reporting, companies must detail the nature of the breach, the likely consequences of the breach, and the measures taken or proposed to be taken to address the breach, among other key factors. Having this data already well documented will help facilitate the entire reporting process.<\/p>\n<p><strong>Prosecute if appropriate:<\/strong> Some threats may require the involvement of law enforcement to prosecute the bad actors involved. If this is the case, officials will want access to well-documented details surrounding the attack\u2014including how it was handled. These documents will become even more critical if the case is taken to court and attackers are brought to trial.<\/p>\n<h2><strong>Putting an incident response plan into play<\/strong><\/h2>\n<p>Customer security and privacy is a top priority for any MSP. Through administrative, operational, and technical security controls, MSPs strive to protect their customers\u2019 data and keep cyberattackers at bay. Robust incident response plans play an integral part in this process, empowering MSPs with a step-by-step guide to identifying, containing, and resolving threats to maintain network stability.<\/p>\n<p>A critical element in any incident response plan is thorough IT documentation. Breach-related insights that are comprehensively chronicled allow MSPs and their customers to learn from past mistakes, comply with government-mandated standards and, in some cases, even bring their attackers to justice. Any strong incident response plan will require robust documentation, and a tool like <a href=\"https:\/\/www.n-able.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\">N&#8209;able<sup>\u00ae<\/sup> Passportal can help your technicians work efficiently<\/a> and unlock previously trapped client knowledge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-43969","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How IT Documentation Relates to Incident Response - N-able<\/title>\n<meta name=\"description\" content=\"Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How IT Documentation Relates to Incident Response - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-19T15:56:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-22T09:28:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_ITDocumentationRelatestoIncidentResponse_Blog_1200x628.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_ITDocumentationRelatestoIncidentResponse_Blog_1200x628.jpeg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"How IT Documentation Relates to Incident Response\",\"datePublished\":\"2020-03-19T15:56:24+00:00\",\"dateModified\":\"2023-03-22T09:28:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\"},\"wordCount\":985,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\",\"name\":\"How IT Documentation Relates to Incident Response - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-03-19T15:56:24+00:00\",\"dateModified\":\"2023-03-22T09:28:46+00:00\",\"description\":\"Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How IT Documentation Relates to Incident Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How IT Documentation Relates to Incident Response - N-able","description":"Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response","og_locale":"de_DE","og_type":"article","og_title":"How IT Documentation Relates to Incident Response - N-able","og_description":"Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.","og_url":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-03-19T15:56:24+00:00","article_modified_time":"2023-03-22T09:28:46+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_ITDocumentationRelatestoIncidentResponse_Blog_1200x628.jpeg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/03\/PP_ITDocumentationRelatestoIncidentResponse_Blog_1200x628.jpeg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"How IT Documentation Relates to Incident Response","datePublished":"2020-03-19T15:56:24+00:00","dateModified":"2023-03-22T09:28:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response"},"wordCount":985,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response","url":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response","name":"How IT Documentation Relates to Incident Response - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-03-19T15:56:24+00:00","dateModified":"2023-03-22T09:28:46+00:00","description":"Find out why solid IT documentation is crucial to creating and maintaining a robust cybersecurity IT incident response plan.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/how-it-documentation-relates-to-incident-response#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How IT Documentation Relates to Incident Response"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/43969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=43969"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/43969\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=43969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}