Incident Response Plan

🌐Community
by aj-geddes · vlatest · Repository

Automatically generates tailored incident response plans based on provided details and pre-defined templates.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add incident-response-plan npx -- -y @trustedskills/incident-response-plan
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "incident-response-plan": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/incident-response-plan"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

The incident-response-plan skill generates comprehensive, step-by-step recovery strategies for IT and cybersecurity breaches. It analyzes specific breach details to produce actionable plans covering containment, eradication, and post-incident review.

When to use it

  • Drafting a response protocol immediately after detecting a ransomware infection or data leak.
  • Preparing a standardized playbook for your team to handle recurring security incidents like phishing attacks.
  • Creating a custom recovery guide for a specific system architecture or cloud environment.
  • Simulating disaster scenarios to test the effectiveness of current organizational procedures.

Key capabilities

  • Generates structured incident response plans tailored to specific breach types.
  • Provides step-by-step instructions for containment and eradication phases.
  • Includes recommendations for post-incident analysis and prevention measures.
  • Adapts output based on provided details about the affected system or threat vector.

Example prompts

  • "Create an incident response plan for a suspected SQL injection attack on our customer database."
  • "Draft a step-by-step recovery guide for restoring services after a DDoS event."
  • "Generate a post-breach analysis checklist and remediation steps for a compromised employee workstation."

Tips & gotchas

  • Provide detailed context about your infrastructure, such as cloud providers or specific software versions, to get more relevant advice.
  • Always validate AI-generated security plans with qualified human experts before deploying them in production environments.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
aj-geddes
Installs
118

🌐 Community

Passed automated security scans.