The first item we look at Preparations to ensure that the people are trained and are equipped with the tools to identify and monitor the incidence. No Incident in the organization should go unnoticed. Incident response personnel should know when to escalate and notify the management entity.As soon as the critical component is identified, the steps to mitigate the risks should be adopted. The enterprise should know what lessons are learned, how,what and where and keep the controls in place.
Incident Response Personnel should also make careful reporting within the organization.Recovery Procedures have to be identified that can be followed, test practiced for data, operating systems, and infrastructures.
First respondent is the individuals that identify, report, control and look out the occurrence of the incident. If the data breach is found, they should know and intimate the data has been compromised. This is how the system personnel can prevent the damage and loss control.