­
Incident Response : How To Classify Incidents Based On Its Severity ? - All Articles - CISO Platform

Author - Sanjay D. Tiwari, CISO, Suryoday Small Finance Bank

Prioritizing the handling of the incident is perhaps the most critical decision point in the incident handling process.
Incidents should not be handled on a first come, first served basis because of resource limitations. Instead, handling should be prioritized based on severity. Prioritizing incident defines how quickly the addressed incident need to be resolved.

Prioritization based on how quickly an incident to be resolved is directly proportional to the impact of the incident.

8669802465?profile=original

Here is a sample of classification of Incidents based on severity.

Also, find below the detailed Incident Management Plan shared by our member.

Type High Medium Low
Technological Malfunctioning of System Group of customers. Employees affected Small group of customers or a branch affected Few people not able to carry out task completely (Group of 2-5 Users), if not contained may escalate.
Unauthorized disclosure of business Information Unauthorized disclosure of confidential and restricted documents/information that has severely impacted the business Unauthorized disclosure of confidential and restricted documents/information that has minor impact on the business Unauthorized disclosure of official documents but no impact on business.
Unauthorized Modification of business Information or Information processing facilities Corporate Website Defacement, unauthorized modification of confidential and restricted documents/information that has severely impacted the business, Unauthorized modification of servers and core network devices. Unauthorized modification of confidential and restricted documents/information that has minor impact on the business, Unauthorized modification of workstation computers Unauthorized modification of official documents but no impact on business
Unavailability of Information or Information processing facilities Unavailability of high critical services Unavailability of medium critical services Unavailability of low critical services
Detection of unauthorized computing or network equipment Someone tries to steal the data using unauthorized Wi-Fi access point which is using official look alike SSID Unauthorized Wi-Fi access point is detected using official look alike SSID Unauthorized computing or network devices is found in restricted areas/Workflow
Physical Access Violation When unauthorized person enters the work area and manage to steal business information or information processing equipment. When unauthorized person enters sensitive / restricted area. When unauthorized person enters the work area Piggybacking or tailgating by staff.
Physical Damage Damages which has caused severe injuries to staff or/and major destruction of assets. Damages which has caused minor injuries to staff or/and major destruction of assets. Damages that do not resulted in any injuries to staff but only minor physical damages of assets.
Non-Availability of services All or Majority of user’s customers are affected due to non-availability of service Only a section / category of users is affected due to non-availability of service Only few or none of users are affected but service is partially affected.

Download The Complete Plan :

Need to download the detailed Incident Management Plan ? You can download it here

8669802284?profile=original

Votes: 0
E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee

Live AI Demo: See how your SOC team can query Splunk via WhatsApp & Gemini (Oct 15)

  • Description:

    Join us for a live AI Demo Talk on "AI-Powered SOC AgentConversational Security Investigations with Whatsapp, Splunk & Gemini" with Sanglap Patra, Cybersecurity Engineer (SIEM & SOAR), Nielsen.

    What You'll See :

    • Investigations over WhatsApp (voice/text) returning Splunk queries in seconds.
    • Gemini AI interpreting logs &…
  • Created by: Biswajit Banerjee
  • Tags: ai, automation, soc, ciso, aipoweredsoc, genai, gemini, whatsapp, splunk

6 City Round Table On "New Guidelines & CISO Priorities for 2025" (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"

    Date: December 1st - December 31st 2025

    Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata

    >> Register Here

  • Created by: Biswajit Banerjee