Hour-by-hour breach response runbook
Standard incident response sequence aligned to DPDP + CERT-In clocks:
- Hour 0 — Awareness: someone (alert, customer complaint, security team) flags a potential breach. Open the incident, page on-call security, start the response timer.
- Hour 0-1 — Triage: confirm breach is real (not a false alarm). Establish initial scope estimate: what data, how many records, what time window.
- Hour 1-3 — Containment: stop the bleeding. Revoke compromised credentials, rotate keys, isolate affected systems, block attacker IPs at the WAF.
- Hour 3-6 — CERT-In notification (Form C): file the cybersecurity incident report. CERT-In's 6-hour clock expires here.
- Hour 6-24 — Forensic scoping: full forensic investigation. Confirm scope, attack chain, data exfiltration evidence. Engage forensic firm if no in-house capacity.
- Hour 24-72 — Board notification draft: prepare the 5-field DPDP notification. Legal review. Stakeholder sign-off.
- Hour 48-72 — Board notification filing: submit to Data Protection Board via prescribed channel. 72-hour clock expires here.
- Hour 72+ — Data principal notification: direct notification to affected data principals where significant harm is likely.
- Day 7-30 — Remediation + post-incident review: root cause analysis, control improvements, retest, executive lessons-learned.