Skip to content
arrow_back
search
E8-MF-ML2.12 bolt ASD Essential Eight

Cybersecurity incident response plan enacted after incident identification

Activate the response plan immediately once a cyber incident is detected.

record_voice_over

Plain language

This control is about having a plan ready to respond to cyber incidents as soon as they're detected. It matters because quick action can reduce damage from attacks, limit downtime, and protect sensitive information from being misused.

Framework

ASD Essential Eight

Control effect

Responsive

E8 mitigation strategy

Multi-factor authentication

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Following the identification of a cyber security incident, the cyber security incident response plan is enacted.
bolt ASD Essential Eight E8-MF-ML2.12
priority_high

Why it matters

Delays in enacting the incident response plan after an incident is identified can worsen breaches, slow recovery, and increase damage.

settings

Operational notes

Define who can declare an incident and trigger the response plan; practise activation regularly so containment and communications start immediately.

Mapping detail

Mapping

Direction

Controls