A ransomware attack encrypts the file server at 2 a.m. The on-call administrator reboots the machine, destroying volatile forensic evidence. The CEO learns about the incident from a customer tweet the next morning. A.5.26 exists to prevent exactly this kind of chaos — by requiring documented, rehearsed response procedures.
When an information security event has been classified as an incident under A.5.25, the organisation must respond quickly, effectively and in a coordinated manner. This control defines what “response” means in practice: containment, evidence preservation, escalation, communication and recovery.
What does the standard require?
- Establish response procedures. The organisation must have documented procedures for responding to confirmed incidents, covering containment, eradication, recovery and communication.
- Assign qualified responders. A designated team with the necessary competence handles the response. Responsibilities are defined before an incident occurs.
- Contain the damage. Immediate actions focus on preventing the incident from spreading — isolating affected systems, revoking compromised credentials, blocking malicious traffic.
- Preserve evidence. Response activities must not destroy evidence needed for root-cause analysis or legal proceedings. A.5.28 provides detailed guidance.
- Communicate with stakeholders. Internal escalation (management, legal, HR) and external communication (regulators, customers, law enforcement) follow predefined rules.
- Conduct post-incident review. After resolution, the organisation analyses what happened, identifies control weaknesses and feeds improvements back into the ISMS.
In practice
Build tiered response playbooks. A single generic procedure cannot cover a phishing compromise, a DDoS attack and a physical break-in equally well. Create playbooks for your most likely incident categories and maintain a generic fallback for unexpected scenarios.
Conduct tabletop exercises. Procedures that have never been tested will fail under pressure. Run tabletop exercises at least annually, walking through realistic scenarios with the actual response team. Document the results and update playbooks accordingly.
Define escalation thresholds. Specify clear criteria for when an incident moves from the operational team to management, from management to the board and from internal handling to external authorities. Ambiguity in escalation is one of the most common reasons for delayed response.
Coordinate with external parties. Establish relationships with external forensic providers, legal advisors and relevant CERTs before you need them. During a crisis is the worst time to negotiate contracts or exchange NDAs.
Typical audit evidence
Auditors typically expect the following evidence for A.5.26:
- Incident response procedure — documented, approved and version-controlled
- Incident response playbooks — category-specific procedures for common incident types
- Incident log / register — records of all incidents with timeline, actions taken, responsible persons and resolution status
- Tabletop exercise reports — evidence that procedures have been tested and improvements identified
- Communication records — internal escalation messages, regulatory notifications, customer communications
- Post-incident review reports — root-cause analysis and corrective actions
KPI
% of IS incidents resolved within defined response timeframes
This KPI measures whether the organisation meets its own service-level targets for incident response. Define target resolution times per severity level (e.g. critical: 4 hours, high: 24 hours, medium: 72 hours). Track the percentage of incidents resolved within these windows.
Supplementary KPIs:
- Mean time to contain (MTTC) per incident severity
- Percentage of incidents with completed post-incident review within 30 days
- Number of incidents requiring external escalation (regulator, law enforcement)
BSI IT-Grundschutz
A.5.26 maps to the BSI requirements for incident handling:
- DER.2.1 (Incident handling) — requires documented procedures for detection, classification, escalation, containment, eradication and recovery of security incidents.
Related controls
A.5.26 is the operational core of the incident management lifecycle:
- A.5.24 — Incident management planning: Establishes the framework and resources that A.5.26 executes.
- A.5.25 — Assessment of IS events: Classifies events as incidents, triggering the A.5.26 response process.
- A.5.27 — Learning from incidents: Uses post-incident reviews from A.5.26 to improve future response.
- A.5.28 — Collection of evidence: Provides detailed guidance on preserving evidence during A.5.26 response activities.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.5.26 — Response to information security incidents
- ISO/IEC 27002:2022 Section 5.26 — Implementation guidance
- BSI IT-Grundschutz, DER.2.1 — Incident handling