WarRoom
Operational runbooks for every major attack type. Real tool commands, decision trees, escalation procedures, and communication templates โ ready to execute when it matters.
These aren't checklists โ they're operational runbooks built for SOC teams, IR leads, and security managers. Every phase has real tool commands (CrowdStrike, Sentinel KQL, Splunk, AWS CLI), decision trees for branching scenarios, escalation matrices with SLAs, and copy-paste communication templates.
All playbooks are free and open. Use them in your IR process today.
RUNBOOKS By Attack Type
Ransomware Incident Response
criticalT1486 โ Data Encrypted for Impact
Operational runbook for active ransomware attacks โ real tool commands, decision trees, and escalation procedures.
Create dedicated Slack/Teams channel: #inc-ransomware-YYYYMMDDNotify:
- CISO
- VP Engineering
- Legal
- CEO (if data exfil confirmed)
External Contacts:
- Cyber insurance carrier hotline
- External IR retainer (if contracted)
- Law enforcement (FBI IC3 / local CERT)
Sentinel KQL: `DeviceFileEvents | where FileName endswith '.encrypted' | summarize count() by DeviceName | sort by count_ desc`Splunk: `index=edr sourcetype=file_events (file_extension=encrypted OR file_extension=locked) | stats count by host | sort -count`Decision Tree
CrowdStrike: Host > Actions > Contain Host (or API: `containment-action v2 POST /devices/entities/devices-actions/v2?action_name=contain`)Manual: Disable switch port โ `interface gi1/0/X` โ `shutdown` / or disable Wi-Fi via MDMPowerShell: `Get-ADUser -Filter {Name -like '*compromised_user*'} | Disable-ADAccount`Azure AD: `Set-AzureADUser -ObjectId user@domain.com -AccountEnabled $false`Palo Alto: `set security profiles anti-spyware block-ip` / Objects > External Dynamic Lists > add C2 IPsDecision Tree
2. RDP: `DeviceLogonEvents | where LogonType == 'RemoteInteractive' | where AccountName == '<compromised>' | sort by Timestamp asc`Scheduled tasks: `schtasks /query /fo LIST /v | findstr /i '<suspicious>'` โ `schtasks /delete /tn <name> /f`Services: `Get-Service | Where-Object {$_.StartType -eq 'Automatic' -and $_.Status -eq 'Running'} | fl Name,DisplayName,BinaryPathName`Registry Run keys: `reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run`WMI subscriptions: `Get-WMIObject -Namespace root\subscription -Class __EventFilter`Decision Tree
Internal Notification
SUBJECT: [CRITICAL] Active Security Incident โ Ransomware
Team โ We are responding to an active ransomware incident affecting [X] systems.
Current status: [Detecting / Containing / Eradicating / Recovering]
War room: #inc-ransomware-YYYYMMDD
Incident Commander: [Name]
DO:
- Report any unusual file activity to the war room immediately
- Continue using approved devices only
DO NOT:
- Attempt to open encrypted files or ransom notes
- Connect personal devices to the corporate network
- Discuss the incident on social media or with external parties
Next update: [time]
External / Customer Notification
SUBJECT: Security Incident Notification
Dear [Customer/Partner],
We are writing to inform you that [Company] experienced a security incident on [date].
We detected the incident promptly and our security team contained it within [X hours].
What happened: [Brief factual description โ reviewed by Legal]
What data was affected: [Specific data types โ reviewed by Legal]
What we're doing: [Remediation steps taken]
What you should do: [Specific guidance for the recipient]
We will provide updates as our investigation progresses. For questions, contact [security contact].
Phishing Response
highT1566 โ Phishing
Full operational runbook for phishing triage โ from email analysis through org-wide purge and user remediation.
Notify:
- SOC Manager
- Email Admin
External Contacts:
- Anti-Phishing Working Group (APWG) โ reportphishing@apwg.org
Decision Tree
Exchange Online: `Get-MessageTrace -SenderAddress '<phishing_sender>' -StartDate '<date>' -EndDate '<date>'`Exchange: `New-ComplianceSearch -Name 'PhishPurge' -ExchangeLocation All -ContentMatchQuery 'subject:<subject> AND from:<sender>'`Then: `New-ComplianceSearchAction -SearchName 'PhishPurge' -Purge -PurgeType SoftDelete`Azure AD: `Revoke-AzureADUserAllRefreshToken -ObjectId <user>` + `Set-AzureADUser -ObjectId <user> -PasswordProfile @{Password='Temp@' + (Get-Random); ForceChangePasswordNextLogin=$true}`Check and remove OAuth app consent grants: `Get-AzureADAuditSignInLogs | where AppDisplayName eq '<suspicious app>'`Sentinel: `DeviceProcessEvents | where InitiatingProcessFileName in ('WINWORD.EXE','EXCEL.EXE','POWERPNT.EXE','AcroRd32.exe') | where Timestamp > ago(2h) | where DeviceName == '<host>'`Business Email Compromise (BEC)
criticalT1534 โ Internal Spearphishing
Operational runbook for BEC attacks โ account compromise, wire fraud prevention, and evidence preservation for law enforcement.
#inc-bec-YYYYMMDDNotify:
- CFO
- CISO
- Legal
- Bank fraud department
External Contacts:
- FBI IC3 (ic3.gov) โ file within 48h for wire recall
- Bank fraud department โ call within 30 min of discovery
Sentinel: `SigninLogs | where UserPrincipalName == '<user>' | where TimeGenerated > ago(30d) | summarize by IPAddress, Location, AppDisplayName | sort by TimeGenerated desc`PowerShell: `Get-InboxRule -Mailbox <user> | where {$_.ForwardTo -or $_.ForwardAsAttachmentTo -or $_.DeleteMessage -eq $true} | fl Name,ForwardTo,DeleteMessage,MoveToFolder`Decision Tree
Azure AD: `Set-AzureADUser -ObjectId <user> -AccountEnabled $false`Revoke ALL sessions: `Revoke-AzureADUserAllRefreshToken -ObjectId <user>``Get-MessageTrace -SenderAddress '<compromised>' -StartDate '<attacker_first_access>' -EndDate (Get-Date)``Get-InboxRule -Mailbox <user> | where {$_.ForwardTo -or $_.ForwardAsAttachmentTo} | Remove-InboxRule -Confirm:$false``Get-MailboxPermission -Identity <user> | where {$_.IsInherited -eq $false} | Remove-MailboxPermission``Set-AzureADUserPassword -ObjectId <user> -Password (ConvertTo-SecureString '<random>' -AsPlainText -Force) -ForceChangePasswordNextLogin $true`Internal Notification
SUBJECT: [URGENT] Business Email Compromise โ Wire Fraud Alert
Finance/Accounting teams:
We have confirmed that [executive name]'s email account was compromised.
Any payment or wire transfer instructions received from this account
between [date] and [date] should be treated as FRAUDULENT.
Action required:
- HALT all pending payments requested by this account
- Verify any completed transfers from this period with the requestor by PHONE
- Report any suspicious payment requests to [security contact]
DO NOT respond to any existing email threads with this account.
Active Lateral Movement
criticalT1021 โ Remote Services
Time-critical runbook for containing an attacker moving between systems โ real-time hunt and containment procedures.
#inc-lateral-YYYYMMDDNotify:
- CISO
- Network Team Lead
- AD Admin
External Contacts:
- External IR retainer (if attacker has domain admin)
RDP: `DeviceLogonEvents | where LogonType == 'RemoteInteractive' | where Timestamp > ago(1h) | where AccountName !in ('<known_admins>') | summarize by DeviceName, AccountName, RemoteIP`PsExec/SMB: `DeviceProcessEvents | where FileName == 'PSEXESVC.exe' or ProcessCommandLine has 'psexec' | where Timestamp > ago(1h)`WMI: `DeviceProcessEvents | where ProcessCommandLine has 'wmic' and ProcessCommandLine has '/node:' | where Timestamp > ago(1h)`WinRM: `DeviceProcessEvents | where FileName == 'wsmprovhost.exe' | where Timestamp > ago(1h)`Build timeline: `DeviceLogonEvents | where AccountName == '<compromised_account>' | where Timestamp > ago(24h) | project Timestamp, DeviceName, RemoteIP, LogonType | sort by Timestamp asc`Decision Tree
Network: ACL block at switch level โ `ip access-list extended INCIDENT_BLOCK` โ `deny ip host <ip> any` โ apply to interface`Get-ADUser -Filter {SamAccountName -like '<account>'} | Disable-ADAccount`Reset 1: `Set-ADUser krbtgt -ChangePasswordAtLogon $true` (or use AD Users & Computers)Check: `DeviceFileEvents | where FileName in~ ('mimikatz.exe','beacon.exe','psexec.exe','sharphound.exe','rubeus.exe') | where Timestamp > ago(7d)`Check process injection: `DeviceProcessEvents | where ActionType == 'CreateRemoteThreadApiCall' | where Timestamp > ago(7d)`Scheduled tasks: `schtasks /query /fo CSV /v | ConvertFrom-Csv | where {$_.TaskName -notlike '\Microsoft*'} | fl TaskName,TaskToRun,Author`Services: `Get-WmiObject win32_service | where {$_.PathName -notlike '*Windows*' -and $_.StartMode -eq 'Auto'} | fl Name,PathName`4. Machine accounts of compromised hosts (`Reset-ComputerMachinePassword`)Cloud Account Compromise
criticalT1078.004 โ Valid Accounts: Cloud Accounts
Runbook for compromised AWS/Azure/GCP identities โ IAM lockdown, resource audit, and cost containment.
Notify:
- Cloud Security Lead
- DevOps TL
- FinOps (for cost anomalies)
External Contacts:
- AWS Support (Enterprise)
- Azure Support (if tenant-level compromise)
- GCP Support
AWS: `aws cloudtrail lookup-events --lookup-attributes AttributeKey=Username,AttributeValue=<compromised> --start-time <date> --max-results 50`Azure: `AzureActivity | where Caller == '<compromised>' | where TimeGenerated > ago(24h) | summarize by OperationNameValue, ActivityStatusValue`GCP: `gcloud logging read 'protoPayload.authenticationInfo.principalEmail="<compromised>"' --limit=50 --format=json`AWS: `aws cloudtrail lookup-events --lookup-attributes AttributeKey=Username,AttributeValue=<user> --start-time <compromise_start> | jq '.Events[].EventName' | sort | uniq -c | sort -rn`Decision Tree
AWS: `aws iam update-access-key --user-name <user> --access-key-id <key> --status Inactive` + `aws iam create-access-key --user-name <user>`GCP: `gcloud iam service-accounts keys disable <key-id> --iam-account=<sa>@<project>.iam.gserviceaccount.com`AWS: Attach inline policy to user: `{"Effect":"Deny","Action":"*","Resource":"*","Condition":{"DateLessThan":{"aws:TokenIssueTime":"<NOW>"}}}`Azure: `Revoke-AzureADUserAllRefreshToken -ObjectId <user>`AWS: `aws iam list-users --query 'Users[?CreateDate>=`<date>`]'` โ delete eachCheck for new access keys on existing users: `aws iam list-access-keys --user-name <user>`AWS: `aws ec2 describe-instances --region <region> --filters 'Name=instance-state-name,Values=running' --query 'Reservations[].Instances[].{ID:InstanceId,Type:InstanceType,Launch:LaunchTime}'`Check ALL regions: `for region in $(aws ec2 describe-regions --query 'Regions[].RegionName' --output text); do echo "==$region=="; aws ec2 describe-instances --region $region --query 'Reservations[].Instances[].InstanceId' --output text; done`Data Breach Response
criticalT1048 โ Exfiltration Over Alternative Protocol
Full operational runbook for confirmed data exfiltration โ technical containment, legal obligations, regulatory notification, and stakeholder communication.
#inc-breach-YYYYMMDD (restricted access โ need-to-know only)Notify:
- CEO
- CISO
- General Counsel / DPO
- Board (if material breach)
External Contacts:
- External forensics firm (contract in advance)
- Cyber insurance carrier (breach coach)
- Outside legal counsel (privilege)
- PR / crisis communications firm
Network: `DeviceNetworkEvents | where RemoteUrl !in ('<known_domains>') | where ActionType == 'ConnectionSuccess' | summarize TotalBytes=sum(SentBytes) by DeviceName, RemoteUrl | where TotalBytes > 100000000 | sort by TotalBytes desc`DNS: Look for DNS tunneling โ `DnsEvents | where Name has_any ('<suspicious_domains>') | summarize count() by Name, Computer`Decision Tree
Block destination IP/domain at firewall: `set security policy from trust to untrust match destination-address <ip> then deny`If USB: disable USB mass storage via GPO: `Computer Config > Admin Templates > System > Removable Storage Access > Deny All`Affected Individuals Notification
SUBJECT: Important Security Notice from [Company]
Dear [Name],
We are writing to inform you of a security incident that may have affected your personal information.
What happened: On [date], we discovered that an unauthorized party accessed systems containing [type of data].
What information was involved: [Specific data types โ e.g., name, email address, phone number]
What we are doing: We have contained the incident, engaged external cybersecurity experts, and notified relevant authorities. We are implementing additional security measures to prevent future incidents.
What you can do:
- Monitor your accounts for unusual activity
- [If credentials involved]: Change your password immediately
- [If financial data]: We are providing [X months] of complimentary credit monitoring through [provider]. Enroll at [URL] using code [CODE].
For questions, contact our dedicated support line: [phone] or [email]
We take the security of your information seriously and sincerely apologize for this incident.
Insider Threat Investigation
highT1078 โ Valid Accounts
Runbook for investigating suspected malicious insider activity โ balancing security operations with legal and HR requirements.
Notify:
- Security Manager
- HR Business Partner
- Legal
External Contacts:
- External forensics (if legal proceedings anticipated)
- Law enforcement (if criminal activity confirmed โ coordinate with Legal)
Mass file downloads: `DeviceFileEvents | where ActionType == 'FileCreated' and FolderPath startswith 'C:\Users\<user>\Downloads' | where Timestamp > ago(7d) | summarize count() by bin(Timestamp, 1h) | sort by Timestamp desc`USB activity: `DeviceEvents | where ActionType == 'PnpDeviceConnected' and DeviceDescription has 'USB' | where Timestamp > ago(30d)`Off-hours access: `SigninLogs | where UserPrincipalName == '<user>' | extend Hour=datetime_part('hour', TimeGenerated) | where Hour < 6 or Hour > 22 | summarize count() by bin(TimeGenerated, 1d)`Decision Tree
Enable mailbox audit logging if not already on: `Set-Mailbox -Identity <user> -AuditEnabled $true -AuditLogAgeLimit 365`Disable AD account: `Disable-ADAccount -Identity <user>`Disable Azure AD: `Set-AzureADUser -ObjectId <user> -AccountEnabled $false`Revoke all sessions: `Revoke-AzureADUserAllRefreshToken -ObjectId <user>`DDoS Attack Response
highT1498 โ Network Denial of Service
Operational runbook for mitigating active DDoS attacks โ from traffic analysis through scrubbing activation and service restoration.
Notify:
- Network Team Lead
- DevOps TL
- VP Engineering (if customer-facing outage)
External Contacts:
- DDoS mitigation provider (Cloudflare/Akamai/AWS Shield) โ activate scrubbing
- ISP upstream โ request blackhole or traffic filtering
Connection exhaustion: `netstat -an | awk '{print $6}' | sort | uniq -c | sort -rn` โ look for abnormal SYN_RECV, ESTABLISHED countsVolumetric (UDP flood, DNS amplification): Massive bandwidth consumption. Check: `tcpdump -i eth0 -nn 'udp' -c 1000 | awk '{print $5}' | sort | uniq -c | sort -rn | head`Protocol (SYN flood, ACK flood): Connection table exhaustion. Check: `ss -s` for socket state distributionApplication layer (HTTP flood, Slowloris): Normal bandwidth, high request rate. Check: WAF logs or `tail -f /var/log/nginx/access.log | awk '{print $1}' | sort | uniq -c | sort -rn | head`Decision Tree
Cloudflare: Security > DDoS > Enable 'Under Attack Mode' / or API: `curl -X PATCH 'https://api.cloudflare.com/client/v4/zones/<zone>/settings/security_level' -H 'Authorization: Bearer <token>' -d '{"value":"under_attack"}'`Nginx: `limit_req_zone $binary_remote_addr zone=ddos:10m rate=10r/s; limit_req zone=ddos burst=20 nodelay;`AWS WAF: Add rate-based rule: `aws wafv2 create-rate-based-statement --rate-limit 1000 --aggregate-key-type IP``ip route add blackhole <target_ip>/32` (last resort โ drops ALL traffic including legitimate)`iptables -A INPUT -s <source_range> -j DROP` (or equivalent in cloud security groups)Clear application caches and request queues: `systemctl restart nginx` or flush CDN cacheMalware Infection Response
highT1204 โ User Execution
Full response playbook for confirmed malware infections โ endpoint isolation, malware analysis, remediation, and re-imaging.
Notify:
- SOC Manager
- Endpoint Team Lead
External Contacts:
- Submit samples to VirusTotal, MalwareBazaar, ANY.RUN for community benefit
Decision Tree
Defender: Advanced hunting > `DeviceFileEvents | where SHA256 == '<hash>'`Supply Chain Attack Response
criticalT1195.002 โ Supply Chain Compromise: Compromise Software Supply Chain
Response playbook for compromised software supply chain โ when a trusted vendor, library, or update mechanism is weaponized.
#inc-supply-chain-YYYYMMDDNotify:
- CISO
- CTO
- VP Engineering
- Legal
- Vendor Management
External Contacts:
- CISA (cisa.gov/report)
- Affected vendor security team
- ISAC
Dependency scan: `npm audit`, `pip audit`, `dotnet list package --vulnerable`Container images: `trivy image <image>`, `grype <image>`Decision Tree
Account Takeover Response
highT1078 โ Valid Accounts
Response playbook for compromised user accounts โ password reset, session revocation, damage assessment, and credential hygiene.
Notify:
- SOC Manager
- Identity Team Lead
`SigninLogs | where UserPrincipalName == '<user>' | where TimeGenerated > ago(7d) | project TimeGenerated, IPAddress, Location, AppDisplayName, DeviceDetail, RiskLevel | sort by TimeGenerated desc`Decision Tree
Azure AD: `Set-AzureADUserPassword -ObjectId <user> -Password (ConvertTo-SecureString (New-Guid).Guid.Substring(0,16) -AsPlainText -Force) -ForceChangePasswordNextLogin $true`Azure AD: `Revoke-AzureADUserAllRefreshToken -ObjectId <user>``Get-InboxRule -Mailbox <user> | where {$_.ForwardTo -or $_.DeleteMessage} | fl`Cryptojacking Response
highT1496 โ Resource Hijacking
Response playbook for unauthorized cryptocurrency mining โ identifying mining processes, cloud resource abuse, and cost containment.
Notify:
- Cloud Security Lead
- FinOps (for cost anomaly)
Linux: `top -bn1 | head -20` + `ps aux | grep -i 'xmr\|mine\|crypto'`Windows: `Get-Process | Sort-Object CPU -Descending | Select -First 10`Network: `netstat -an | grep ':3333\|:4444\|:8333\|:14444'` (common mining ports)AWS: Check for unauthorized EC2 instances: `aws ec2 describe-instances --filters 'Name=instance-state-name,Values=running'`Decision Tree
Linux: `kill -9 $(pgrep -f 'xmr\|mine\|crypto')`Windows: `Stop-Process -Name 'xmrig','minerd' -Force`AWS: `aws ec2 terminate-instances --instance-ids <id>`Azure: `az vm delete --resource-group <rg> --name <vm> --yes`Web Application Attack Response
criticalT1190 โ Exploit Public-Facing Application
Response playbook for attacks against web applications โ SQL injection, XSS, RCE, file upload, and other OWASP Top 10 attacks.
Notify:
- Application Security Lead
- DevOps Lead
- Product Owner
External Contacts:
- Web application pen testing firm (if persistent attacker)
ModSecurity: `grep 'ModSecurity' /var/log/apache2/error.log | tail -50`Decision Tree
Zero-Day / Vulnerability Exploitation
criticalT1190 โ Exploit Public-Facing Application
Response playbook for active exploitation of unpatched vulnerabilities โ emergency mitigation when no vendor patch is available.
#inc-zeroday-CVE-YYYY-XXXXXNotify:
- CISO
- VP Engineering
- Network Team Lead
External Contacts:
- CISA
- Vendor security team
- ISAC
- External IR retainer
Decision Tree
Stolen / Lost Device Response
highT1078 โ Valid Accounts
Response playbook for stolen or lost corporate devices โ remote wipe, session revocation, credential rotation, and data exposure assessment.
Notify:
- IT Security
- MDM Admin
- User's Manager
Decision Tree
Azure AD: `Revoke-AzureADUserAllRefreshToken -ObjectId <user>`API Security Breach Response
criticalT1106 โ Native API
Response playbook for compromised API keys, unauthorized API access, or API abuse โ rate limiting, key rotation, and access audit.
Notify:
- Platform Security Lead
- API Team Lead
- DevOps
Decision Tree
`trufflehog git file://. --only-verified``gitleaks detect -v``git filter-branch` or BFG Repo-Cleaner to purge from historyImplement pre-commit hooks to prevent secrets in code (`pre-commit` + `detect-secrets`)OT/ICS Cyber Incident Response
criticalT826 โ Impair Process Control
This playbook outlines the comprehensive steps and procedures for responding to a cyber incident affecting Operational Technology (OT) and Industrial Control Systems (ICS) environments. It prioritizes safety, operational continuity, and data integrity, recognizing the unique challenges and critical nature of these systems. This playbook is designed for incidents ranging from unauthorized access and data exfiltration to malware infection (e.g., ransomware) and direct process manipulation or disruption.
Dedicated Microsoft Teams Channel: #OT-Incident-WarRoom-[Date] OR Physical Command Center (if required for severe incidents).Notify:
- Incident Commander (On-Call)
- Head of OT Operations
- CISO
- CIO
- Legal Counsel
- Communications Lead
External Contacts:
- CISA (Cybersecurity and Infrastructure Security Agency)
- FBI (Federal Bureau of Investigation)
- Sector-specific ISAOs/ISACs
- Relevant Regulatory Bodies (e.g., FERC, EPA, NERC-CIP)
- Third-party Incident Response Firm (if retained)
Decision Tree
Decision Tree
Decision Tree
Internal Notification
Subject: URGENT: OT/ICS Incident - [Brief Description] - [Date/Time]
Team,
This is an urgent notification regarding a detected cyber incident impacting our Operational Technology (OT) / Industrial Control Systems (ICS) environment.
**Incident Status:** [e.g., 'Initial Detection', 'Containment in Progress', 'Recovery Phase']
**Affected Systems/Areas:** [e.g., 'PLC X in Plant Y', 'HMI Z in Control Room A', 'Segment B of Production Line C']
**Initial Impact Assessment:** [e.g., 'Minor disruption to production in Line C', 'Potential compromise of process data', 'Safety systems remain operational', 'Production halted in Plant Y']
**Current Actions:** The Incident Response Team, in collaboration with OT Engineering, is actively working to contain the threat and ensure safety. Specific actions include: [e.g., 'Network segmentation of affected area', 'Forensic analysis on HMI Z', 'Verification of PLC X integrity'].
All personnel are reminded to adhere strictly to incident response protocols. Please do not attempt to access affected systems or make any changes without explicit direction from the Incident Commander.
Further updates will be provided via [War Room Channel/Email] every [X hours/minutes] or as significant developments occur.
**Incident Commander:** [Name] ([Contact Info])
**OT Lead:** [Name] ([Contact Info])
Your cooperation and vigilance are critical.
[Company Leadership/CISO]
External / Customer Notification
Subject: [Company Name] - Critical Operational Technology Incident Notification
[Date]
FOR IMMEDIATE RELEASE / CONFIDENTIAL - FOR REGULATORY BODIES AND LAW ENFORCEMENT
[Company Name] is providing this notification regarding a detected cybersecurity incident impacting a portion of our Operational Technology (OT) environment.
Upon detection, our robust incident response protocols were immediately activated. Our internal teams, including cybersecurity experts and OT engineers, are actively engaged in managing the situation. We have also engaged [e.g., external cybersecurity specialists, law enforcement (FBI/CISA)] to assist in our efforts.
**Current Status:** Our primary focus remains on ensuring the safety of personnel, protecting the environment, and maintaining the integrity of our critical operations. We are diligently working to contain the incident and restore full operational capabilities securely and efficiently.
**Impact Assessment:** We are currently conducting a thorough investigation to determine the full scope and impact of this incident. At this time, [Company Name] is [e.g., 'experiencing limited operational disruption in X area', 'working to mitigate potential impacts on Y process']. We are taking all necessary measures to prevent further unauthorized activity.
**Our Commitment:** The security and reliability of our operations are paramount. We are committed to a comprehensive and transparent response. We will provide further updates as our investigation progresses and as appropriate.
For further inquiries, please contact:
[Media Contact Name/Email]
[Legal Counsel Name/Email]
[Company Name]
New runbooks ship regularly.
17 operational runbooks and growing. Built for real incident response teams.