May 7, 2025

The Post-Breach Checklist: What to Do in the First 72 Hours

The breach already happened. Now it’s about limiting damage, restoring trust, and protecting your business from round two.

The Breach Isn’t the End—It’s the Beginning

Once a breach occurs, the clock starts ticking. You have legal, operational, financial, and reputational consequences inbound—and they don’t wait for you to catch your breath.

What you do in the first 72 hours defines whether your organization contains the damage or amplifies it. Most companies aren’t ready. They scramble. They delay decisions. They guess.

That’s why you need a post-breach checklist—a tactical guide to action that helps you respond with clarity, speed, and control.

What You’re Up Against

In the first hours after a breach, you’re navigating:

  • Active compromise and ongoing attacker presence
  • Internal confusion and finger-pointing
  • Legal and regulatory reporting deadlines
  • Customer and partner trust erosion
  • Media or public exposure

This is not the time to write your plan. This is the time to execute it. If you don’t have one, this checklist will serve as your emergency guide.

Hour 0–4: Confirm, Contain, Communicate Internally

Confirm the Incident

  • Verify it’s not a false positive or unrelated outage
  • Establish a secure communication channel—don’t use potentially compromised systems
  • Notify your core incident response team (security, IT, legal, leadership)

Contain the Threat

  • Disable compromised accounts
  • Isolate affected endpoints or systems
  • Capture forensics (logs, memory, disk) before wiping anything
  • Revoke exposed credentials or secrets immediately

Begin Internal Communication

  • Align leadership with facts—not assumptions
  • Communicate clearly and calmly: “We’re investigating. Here’s what we know.”
  • Identify a single point of contact for coordination

Hour 4–24: Assess, Notify, and Start Recovery

Assess the Blast Radius

  • What systems, data, and users are affected?
  • Has sensitive or regulated data been accessed or exfiltrated?
  • Are backups intact? What’s the recovery timeline?

Legal and Regulatory Coordination

  • Notify legal counsel—internal or outside
  • Begin documenting all actions taken
  • Evaluate breach notification requirements: state laws, GDPR, GLBA, HIPAA, etc.

External Notifications

  • Consider informing cyber insurance provider
  • If ransomware: evaluate whether law enforcement or breach coach should be involved
  • Identify customers, partners, or vendors who need to be notified (not all at once—only if required)

Begin Recovery Planning

  • What can be restored? What needs to be rebuilt?
  • What dependencies exist on affected systems?
  • Define short-term and long-term restoration steps

Hour 24–48: Stabilize and Begin the Storytelling

Establish Executive Messaging

  • Draft internal and external statements
  • Prepare for media, investor, or board inquiries
  • Be transparent, but don’t speculate. Stick to facts. Update as you learn.

Bolster Monitoring

  • Assume attacker persistence—watch for lateral movement
  • Increase logging and detection sensitivity
  • Validate system integrity before reintroducing to production

Begin Root Cause Analysis

  • What failed? A control, a process, or a person?
  • Was it a known vulnerability, phishing, credential reuse?
  • How long was the attacker inside?

Hour 48–72: Audit, Analyze, and Plan Forward

Document the Full Timeline

  • When did the compromise begin?
  • What was the attack vector?
  • What were the attacker’s actions and objectives?

Evaluate Gaps and Response Performance

  • What went well?
  • What failed or slowed the response?
  • Did roles and responsibilities hold up under pressure?

Update Your IR Plan

  • Based on this incident, what changes must be made?
  • Do escalation procedures need tuning?
  • Are new tools, controls, or training required?

Schedule and Run a Formal Post-Mortem

  • Debrief with all stakeholders
  • Capture technical lessons and business impacts
  • Turn lessons into policy or control improvements

The 72-Hour Rule of Breaches

If you wait until the dust settles to act, you’ve already lost valuable time and control. In the first 72 hours, proactive response beats perfect response every time.

Here’s the high-level mindset:

  • Don’t freeze—move fast, but don’t move blindly
  • Contain the threat, then communicate
  • Prioritize truth over polish
  • Assume someone will ask for logs, emails, and decisions—document everything

Conclusion: Your Checklist Is Your Compass

No matter how good your security is, breaches happen. And when they do, it’s not the technical tools that determine the outcome—it’s your team’s readiness, clarity, and ability to act under pressure.

A post-breach checklist gives you structure in chaos, focus under fire, and a path forward when everything else is breaking.

You may only get one shot to respond well. Make it count.

Interested in more?

Discover our other articles