PREMIUM

Incident Playbooks

Step-by-step response playbooks for every attack type. Built for SOC teams, IR leads, and security managers โ€” ready to execute when it matters most.

When an incident hits, you don't have time to Google. These playbooks give you phase-by-phase actions โ€” from detection through containment, eradication, recovery, and post-incident review. Every step is concrete, every role is assigned.

Free playbooks are fully accessible. Premium playbooks show the overview โ€” unlock all phases with SCW Premium.


8 Playbooks
8 Attack Types
5 Response Phases

PLAYBOOKS  By Attack Type

Ransomware Incident Response

FREE

T1486

Step-by-step response for active ransomware attacks โ€” from detection through containment, eradication, and recovery.

critical โฑ 2-8 hours SOC AnalystIncident CommanderIT OpsLegal
ransomwareencryptionbusiness-continuity

Phishing Response

FREE

T1566

Handle reported phishing emails โ€” from triage through user remediation and organization-wide protection.

high โฑ 30-90 minutes SOC AnalystEmail Admin
phishingemailsocial-engineering

Business Email Compromise (BEC)

๐Ÿ”’ PRO

T1534

Respond to BEC attacks where an attacker compromises or impersonates an executive to redirect payments or steal data.

critical โฑ 2-6 hours SOC AnalystIncident CommanderFinanceLegal
becemailfraudfinancial
๐Ÿ”’

Unlock all 5 phases with SCW Premium

Active Lateral Movement

๐Ÿ”’ PRO

T1021

Respond when an attacker is actively moving between systems in your network โ€” time-critical containment.

critical โฑ 1-4 hours SOC AnalystIncident CommanderNetwork Team
lateral-movementnetworkcontainment
๐Ÿ”’

Unlock all 5 phases with SCW Premium

Cloud Account Compromise

๐Ÿ”’ PRO

T1078.004

Respond to compromised cloud accounts (AWS, Azure, GCP) โ€” from initial detection through full remediation.

critical โฑ 2-6 hours SOC AnalystCloud Security EngineerDevOps
cloudawsazuregcpaccount-compromise
๐Ÿ”’

Unlock all 5 phases with SCW Premium

Data Breach Response

๐Ÿ”’ PRO

T1048

Full response plan when sensitive data has been confirmed exfiltrated โ€” technical, legal, and communication steps.

critical โฑ Days to weeks Incident CommanderSOC AnalystLegalPRDPO
data-breachexfiltrationgdprcompliance
๐Ÿ”’

Unlock all 5 phases with SCW Premium

Insider Threat Investigation

๐Ÿ”’ PRO

T1078

Investigate and respond to suspected malicious insider activity โ€” balancing security with legal and HR requirements.

high โฑ Days to weeks SOC AnalystHRLegalIncident Commander
insider-threatinvestigationhrlegal
๐Ÿ”’

Unlock all 5 phases with SCW Premium

DDoS Attack Response

๐Ÿ”’ PRO

T1498

Mitigate active DDoS attacks โ€” from initial detection through traffic scrubbing and service restoration.

high โฑ 1-4 hours SOC AnalystNetwork TeamDevOps
ddosavailabilitynetworkcdn
๐Ÿ”’

Unlock all 5 phases with SCW Premium


Respond faster. Respond smarter.

Unlock all 8 incident playbooks โ€” with full phase-by-phase response steps your team can execute immediately.