Demo · sample data, not for production use · request the real tool →

Incident Response Policy

Defines roles, severity tiers, communication plans, and recovery objectives for security incidents.

SecurityPublished

Current version · v2.7

Effective 8/5/2025 — approved by CEO

Incident Response Policy

1. Purpose

This incident response policy establishes the requirements, responsibilities, and expectations governing how AC5 Labs Demo Co protects information assets, manages risk, and meets its contractual and regulatory obligations. It applies to all employees, contractors, interns, and third parties acting on behalf of the company.

2. Scope

This policy covers all information systems, devices, networks, facilities, and data — whether owned, leased, or operated under contract — that are used to conduct company business. It applies regardless of location and includes remote work, customer environments, and bring-your-own-device arrangements.

3. Roles & Responsibilities

The CISO owns this policy and is accountable for its content, approval cycle, and exceptions. Department heads are responsible for operationalizing the policy within their teams and ensuring relevant personnel attest within thirty (30) days of hire and annually thereafter.

4. Policy Statements

4.1 The company shall maintain documented controls aligned with the cross-referenced framework requirements listed at the end of this policy.

4.2 Exceptions to this policy must be requested in writing, justified by a documented business need, time-bound, and approved by the policy owner. All approved exceptions shall be logged and reviewed at least annually.

4.3 Violations of this policy may result in disciplinary action up to and including termination of employment or contract, and where applicable, civil or criminal penalties.

5. Compliance & Enforcement

Compliance is verified through periodic internal audits, automated control testing where feasible, and external assessment as part of the company's overall compliance program. Non-conformities will be tracked through the corrective action process and reported to executive leadership monthly.

6. Review

This policy is reviewed at least annually, or sooner if material changes occur in the business, technology environment, or applicable regulations. The reviewer captures changes in the version history and re-attestation is required when a substantive update is published.

Document control: POL-IS-004 v2.7 · Approved per the version history below.

Version history

3 versions on record

  1. v2.7current
    8/5/2025

    Aligned reporting timelines with new SEC cyber rules.

    Approved by CEO

  2. v2.6obsolete
    8/1/2024

    Added ransomware-specific runbook references.

    Approved by CEO

  3. v2.5obsolete
    8/10/2023

    Initial publication after tabletop exercise findings.

    Approved by CEO

Status
Published
Version
v2.7
Effective
8/5/2025
Next review
8/5/2026
On track

Attestation status

Completed7/11 (64%)

Cross-references

Related framework controls

ISO 27001 A.5.24SOC 2 CC7.3CMMC IR-1NIST 800-171 3.6.1

Distribution list

Owner: CISO

  • Engineering
    Last reminded 4/1/2026
    38
  • IT operations
    Last reminded 4/1/2026
    12
  • Executives
    Last reminded 3/1/2026
    7