Skip to content
arrow_back
search
E8-RA-ML2.13 bolt ASD Essential Eight

Enact cyber incident response plan after an incident is identified

Start the response plan immediately after a cyber incident is detected.

record_voice_over

Plain language

If your business experiences a cyber incident, you need to act fast by following a pre-made plan. Without this immediate response, the damage from the incident could worsen, impacting your operations and reputation.

Framework

ASD Essential Eight

Control effect

Responsive

E8 mitigation strategy

Restrict administrative privileges

Classifications

N/A

Official last update

N/A

Control Stack last updated

19 Mar 2026

E8 maturity levels

ML2

Official control statement

Following the identification of a cyber security incident, the cyber security incident response plan is enacted.
bolt ASD Essential Eight E8-RA-ML2.13
priority_high

Why it matters

If the incident response plan isn’t enacted immediately after an incident is identified, containment is delayed, increasing spread, downtime, data loss and recovery cost.

settings

Operational notes

Define clear activation triggers (e.g., confirmed compromise), who can declare an incident, and the first-hour actions (containment, comms, escalation) to enact the plan fast.

Mapping detail

Mapping

Direction

Controls