Today’s Lesson
Security for Legal SaaS — Episode 54: Incident Response Playbooks
The Worst Time to Write Your Plan
The worst time to figure out what to do during a security incident is during the incident. Adrenaline is high, information is incomplete, and every minute of delay means more data exposed or more systems compromised. Incident response playbooks — pre-written, rehearsed procedures for specific types of security events — transform a chaotic scramble into a structured process.
NIST SP 800-61 Revision 3, finalised in April 2025, represents the first major update to NIST's incident response guidance since 2012. It restructures incident response activities around the NIST Cybersecurity Framework 2.0 six core functions (Govern, Identify, Protect, Detect, Respond, Recover), integrating incident response into broader risk management rather than treating it as a standalone process.12
For a legal SaaS platform — where a breach means compromised attorney-client privileged communications, case strategy documents, and personally identifiable information — the response window is measured in minutes, not days.
Incident Classification: Severity Levels
Not every security event is a crisis. Classification determines the speed and scope of the response.
| Severity | Criteria | Example | Response Time |
|---|---|---|---|
| Critical (P1) | Active data exfiltration; compromised admin access; client data confirmed exposed | Attacker downloading case files via compromised admin account | Immediate. All-hands. |
| High (P2) | Confirmed compromise with potential data exposure; production system breach | Malware on application server; database credentials found on dark web | Within 1 hour |
| Medium (P3) | Suspicious activity requiring investigation; no confirmed data exposure | Unusual login patterns; failed exploit attempts against known vulnerability | Within 4 hours |
| Low (P4) | Minor policy violation; potential vulnerability requiring assessment | Developer committed an API key to a public repo; outdated dependency found | Within 24 hours |
The trigger for escalation must be objective, not subjective. "This looks serious" is not a classification criteria. "Successful authentication from a country where we have no users, followed by API calls to the document export endpoint" is a P1.
The Incident Lifecycle
NIST SP 800-61r3 maps incident response to five phases, aligned with the CSF 2.0 Respond and Recover functions:1
1. Detection and Analysis
This is where Episode 53's monitoring pays off. The monitoring system generates an alert. The on-call responder triages: Is this a real incident or a false positive? What systems are affected? What data may be at risk?
Key actions:
- Verify the alert using multiple data sources (don't act on a single log entry)
- Determine the scope: which systems, which users, which data
- Assign severity based on the classification table above
- Begin an incident log — timestamp every action from this point forward
2. Containment
Stop the bleeding without destroying evidence. Containment has two stages:
Short-term containment: Immediate actions to prevent further damage. Block the attacker's IP. Terminate compromised sessions. Disable compromised accounts. Isolate affected servers from the network.
Long-term containment: More surgical actions while you prepare for eradication. Apply temporary patches. Redirect traffic away from compromised systems. Set up enhanced monitoring on affected systems.
Evidence preservation is critical for legal SaaS. Do not wipe or rebuild a compromised system before capturing forensic images. If client privileged data was exposed, you may need those forensic records for regulatory notifications, insurance claims, or litigation. Containment must preserve evidence, not destroy it.
3. Eradication
Remove the cause of the incident. If malware was involved, clean or rebuild affected systems from known-good images. If credentials were stolen, rotate every affected credential — not just the ones you know about, but every credential the compromised system had access to (as we discussed in Episode 50 regarding workstation compromise). If a vulnerability was exploited, patch it.
4. Recovery
Restore systems to normal operation. Verify that the root cause has been eliminated. Monitor recovered systems with heightened scrutiny for days or weeks after recovery — attackers often leave secondary access paths (backdoors) that activate after the initial breach appears resolved.
5. Post-Incident Learning
Conduct a blameless retrospective within one week of the incident. Document: What happened? When was it detected? How long until containment? What worked? What didn't? What changes prevent recurrence? Update your playbooks based on lessons learned.
Playbook Templates for Legal SaaS
Data Breach Playbook
Trigger: Confirmed or suspected unauthorised access to client data.
- Contain: Isolate affected systems. Terminate all sessions for compromised accounts. Block attacker access.
- Assess scope: Which clients' data was accessed? What type of data — case documents, communications, PII?
- Preserve evidence: Forensic image of affected systems before any cleanup.
- Legal assessment: Engage legal counsel (internal or external) to determine notification obligations.
- Notification chain: Client notification, regulatory notification, law enforcement (if applicable).
- Remediate: Patch the vulnerability, rotate credentials, enhance monitoring.
- Post-incident: Retrospective, playbook update, client follow-up.
Compromised Credentials Playbook
Trigger: Credentials found on dark web, successful login from impossible geography, or credential stuffing with confirmed account access.
- Force password reset for all affected accounts immediately.
- Terminate all active sessions for those accounts.
- Review audit logs for actions taken while the account was compromised.
- Check for persistence: Did the attacker create new accounts, modify permissions, or install API keys?
- Notify affected users with specific guidance on what to do.
- Review MFA status — if compromised accounts lacked MFA, enforce it platform-wide.
Insider Threat Playbook
Trigger: Unusual data access patterns from an authorised user — bulk downloads, access outside role scope, data transfers to personal devices.
- Do not alert the subject until legal and HR are consulted.
- Preserve logs and access records before any investigation conversation.
- Assess scope: What data was accessed? Was it transferred externally?
- Coordinate with legal for employment law implications and potential law enforcement referral.
- Revoke access once the investigation supports it.
Communication Plans: Who to Notify, When, and What to Say
Legal Notification Obligations
Breach notification is not optional. Timelines vary by jurisdiction:
| Regulation | Notification Window | Who Must Be Notified |
|---|---|---|
| GDPR (EU) | 72 hours to supervisory authority3 | Authority + affected individuals if high risk |
| PDPA (Singapore) | 3 calendar days to PDPC | Commission + affected individuals if significant harm |
| US State Laws | Varies (30-90 days typical) | State AG + affected individuals |
| HIPAA (US healthcare) | 60 days to HHS | HHS + affected individuals + media if >500 people |
The GDPR imposes fines of up to EUR 20 million or 4% of global revenue for serious breaches, and missing the 72-hour notification window increases penalties and erodes trust.3
For legal SaaS specifically: NYC Bar Formal Opinion 2024-3 and ABA Formal Opinion 483 establish that lawyers must notify clients when a breach exposes material client confidential information that is "likely to affect the position of the client or the outcome of the client's legal matter."45 A data breach doesn't automatically waive attorney-client privilege — but the firm must take affirmative steps to reaffirm privilege designations and prevent unauthorised use of leaked material.
Communication Rules During an Incident
- Designate a single spokesperson. Inconsistent public statements create legal liability.
- Say what you know, not what you speculate. "We detected unauthorised access and are investigating" — not "we think a Russian hacker group got in."
- Don't promise what you haven't verified. "No data was compromised" is a statement you may have to retract. "Our investigation is ongoing" is safe.
- Document everything. Every communication, every decision, every timestamp. This is evidence for regulators and potentially for litigation.
Legal Hold Preservation
When a breach may involve litigation or regulatory investigation, implement a legal hold: a directive to preserve all potentially relevant documents, logs, communications, and forensic data. This means:
- No automated log rotation that deletes incident-period logs
- No system rebuilds that destroy forensic evidence
- No email deletion by involved employees
- Forensic images of affected systems stored securely
Failure to preserve evidence after a known incident can result in sanctions, adverse inference rulings, and regulatory penalties separate from the breach itself.
The Playbook Maintenance Cycle
A playbook that was written once and never updated is only slightly better than no playbook. Review and update quarterly:
- After every real incident (incorporate lessons learned)
- After major infrastructure changes (new services, new data flows)
- After regulatory changes (new notification requirements)
- After tabletop exercises (simulated incidents reveal gaps)
The goal is not perfection — it's preparation. A team with a decent playbook they've rehearsed will outperform a team with a perfect playbook they've never opened.
Next episode: disaster recovery and business continuity — what happens when the incident isn't a breach but a complete system failure, and your clients need their case files.
Sources & references
- NIST, SP 800-61 Revision 3: Incident Response Recommendations and Considerations for Cybersecurity Risk Management.
- NIST, Cybersecurity Framework 2.0.
- Konfirmity, GDPR Incident Response Plan: A Practical Guide with Steps & Examples (2026).
- NYC Bar Association, Formal Opinion 2024-3: Ethical Obligations Relating to a Cybersecurity Incident.
- ABA, When Should Law Firms Notify Clients About Data Breaches?.
- UnderDefense, Data Breach Incident Response Plan for 2026.
- ABA, Attorney-Client Privilege and Work Product Considerations Following Cyber Incidents.
- Linford & Company, NIST SP 800-61 Rev 3: New Incident Response Framework Guide.
- Tandem, Updated NIST Incident Response Guidance: SP 800-61 Rev. 3.
- Inside Privacy, NIST Publishes Updated Incident Response Recommendations.
- Epiq Global, ABA Issues Opinion — How To Respond to Data Breaches.