Skip to content
arrow_back
search
E8-AH-ML2.18 bolt ASD Essential Eight

Cyber incident response plan is enacted after identification

Activate the response plan immediately after identifying a cyber incident.

record_voice_over

Plain language

This control is like having a pre-set plan of action for when a cyber attack happens. It's crucial because acting quickly can stop a problem from getting worse. Without it, a business could face greater damage or downtime if an attack happens and no one knows what to do next.

Framework

ASD Essential Eight

Control effect

Responsive

E8 mitigation strategy

Application hardening

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Following the identification of a cyber security incident, the cyber security incident response plan is enacted.
bolt ASD Essential Eight E8-AH-ML2.18
priority_high

Why it matters

Delays in enacting an incident response plan can amplify damage, extend downtime and lead to loss of sensitive data.

settings

Operational notes

Define triggers for incident identification and empower the on-call lead to immediately activate the IR plan, notify stakeholders and start containment steps.

Mapping detail

Mapping

Direction

Controls