Data Breach / Exfiltration Playbook
Regulatory Clocks Are Running
From the moment a breach is confirmed (or reasonably suspected), regulatory notification deadlines begin. GDPR: 72 hours to DPA. SEC: 4 business days for material incidents. Do not wait for full forensic certainty — notify Legal immediately upon suspicion.
| Field | Value |
| Playbook ID | IR-PB-006 |
| Severity | Critical (P1) |
| RTO — Containment | < 2 hours |
| Owner | IR Lead |
| Required Co-owners | Legal, Privacy Officer, Compliance, Communications |
| Last Reviewed | 2025-01-01 |
Trigger Conditions
Activate this playbook on any of the following:
- [ ] DLP alert: large volume of sensitive data transmitted to external destination
- [ ] Proxy/firewall alert: outbound transfer exceeding threshold (e.g., >500MB to unknown IP)
- [ ] SIEM: insider behavior + network anomaly correlation (user + large upload)
- [ ] Cloud storage: S3/Blob/GCS bucket made public or mass pre-signed URL generation
- [ ] Third-party notification: vendor, partner, or law enforcement notifies of data found externally
- [ ] Dark web monitoring: company data observed on paste site, hacker forum, or for-sale listing
- [ ] EDR: compression + large file copy to removable media or cloud sync folder
- [ ] Email gateway: sensitive attachment sent to personal/competitor domain
- [ ] Ransomware incident with confirmed exfiltration (double-extortion model)
Decision Tree
flowchart TD
A([Breach Trigger Detected]) --> B[Notify IR Lead + Legal\nDo NOT touch exfil channel yet\nPreserve evidence first]
B --> C[Classify: What data\nwas potentially exfiltrated?]
C --> D{Data type?}
D -- PII/PHI/Financial/IP --> E[Activate full breach\nresponse — this playbook]
D -- Non-sensitive / public data --> F[Document. Lower severity.\nStandard IR track.]
E --> G[Contain exfil channel\nwithout tipping off attacker]
G --> H[Determine scope:\nHow many records?\nWhich data subjects?]
H --> I{Can scope be\nquantified within 24h?}
I -- Yes --> J[Proceed to\nnotification matrix]
I -- No --> K[Notify Legal: partial scope\nNotify regulators with\n'investigation ongoing' caveat]
J --> L[Issue legal hold\nPreserve all evidence]
K --> L
L --> M[Draft notifications\nper regulatory matrix]
M --> N([Remediate + Monitor\nPost-incident review])
Phase 1 — Data Classification
Determine the classification of data involved before any notification:
| Data Type | Examples | Key Regulations |
| PII | Name, SSN, DOB, address, email, phone | GDPR, CCPA, state breach laws |
| PHI | Medical records, diagnoses, insurance IDs | HIPAA, HITECH |
| Financial data | Credit card numbers, bank account numbers | PCI DSS, GLBA |
| Credentials | Usernames/passwords, API keys, private keys | All applicable + operational risk |
| Intellectual Property | Trade secrets, source code, R&D data | Trade secret law, competitive harm |
| Employee data | HR records, payroll, performance data | GDPR, state laws |
| Minor data (COPPA) | Data of users under 13 | COPPA |
Data Classification Quick-Query
# Search for PII patterns in extracted/exfil'd files (if file copies available)
# SSN pattern
grep -rP "\b\d{3}-\d{2}-\d{4}\b" /evidence/exfil_files/ > ssn_hits.txt
# Credit card numbers (Luhn-valid patterns)
grep -rP "\b(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14}|3[47][0-9]{13})\b" \
/evidence/exfil_files/ > cc_hits.txt
# Email addresses
grep -rP "\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Z|a-z]{2,}\b" \
/evidence/exfil_files/ > email_hits.txt
# Health record keywords
grep -riP "(diagnosis|patient|DOB|date.of.birth|prescription|ICD-10|NPI)" \
/evidence/exfil_files/ > phi_keywords.txt
Phase 2 — Scope Determination
2.1 Record Count Estimation
- [ ] Query source database/system for records accessible to compromised account
- [ ] Cross-reference DLP logs for volume of data moved (file count, byte count)
- [ ] Identify time window of exfiltration from log analysis
- [ ] Determine if partial or full dataset was accessed
-- Example: Determine scope of compromised database access
-- Query based on access logs from DBMS (SQL Server, PostgreSQL)
SELECT
user_name,
object_name,
statement,
COUNT(*) AS query_count,
MIN(event_time) AS first_access,
MAX(event_time) AS last_access
FROM sys.dm_audit_actions_log -- or equivalent audit table
WHERE user_name = 'compromised_user'
AND event_time BETWEEN '2024-01-01' AND '2024-01-31'
GROUP BY user_name, object_name, statement
ORDER BY last_access DESC;
2.2 Data Subject Identification
- [ ] Identify which specific individuals' data was in scope
- [ ] Export list of affected data subjects with: name, contact info, data type affected
- [ ] Assess risk level to individuals (financial harm, identity theft, physical safety)
- [ ] Segment by jurisdiction (EU subjects, CA residents, NY residents, etc.)
Phase 3 — Contain
3.1 Block Exfiltration Channel
# If exfil is via outbound HTTPS to a specific IP/domain:
# Firewall — block egress immediately
iptables -A OUTPUT -d <exfil-destination-ip> -j DROP
# Palo Alto / Cisco ASA — add to block list via CLI or API
# If exfil is via DNS tunneling:
# Block the attacker's DNS resolver or domain at internal DNS
# Bind9 example — add to Response Policy Zone (RPZ):
# attacker-dns-domain.com CNAME . # NXDOMAIN all queries
# If via cloud sync (OneDrive, Dropbox, Box):
# Block cloud storage domains at proxy
# Squid / Zscaler / Netskope — add category block or specific domain block
# If exfil is from cloud storage bucket (S3, GCS):
# Revoke public access immediately
aws s3api put-public-access-block --bucket affected-bucket \
--public-access-block-configuration \
"BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true"
3.2 Endpoint Isolation
# Isolate endpoint where exfil originated (via EDR)
# CrowdStrike
falconctl contain --hostname exfil-source-host
# MDE
$DeviceId = "<DEVICE_ID>"
Invoke-RestMethod -Method Post `
-Uri "https://api.securitycenter.microsoft.com/api/machines/$DeviceId/isolate" `
-Headers @{Authorization="Bearer $token"} `
-Body '{"Comment":"Data breach IR — IR-PB-006","IsolationType":"Full"}'
Phase 4 — Evidence Preservation
Regulatory investigations and litigation require intact, authenticated evidence. Do not alter log sources.
Evidence Collection Checklist
- [ ] Network logs: firewall, proxy, NetFlow — capture and hash immediately
- [ ] Endpoint artifacts: EDR telemetry, browser history, file system timeline
- [ ] Email/messaging logs: sent items, DLP quarantine, attachment logs
- [ ] DLP event logs: full record of all alerts and allowed events in the exfil window
- [ ] Database access logs: query logs for affected data stores
- [ ] Cloud storage access logs: S3 access logs, Azure Storage analytics, GCS data access logs
- [ ] SIEM events: raw event export for the incident window
# Hash all collected evidence
find /evidence/ -type f -exec sha256sum {} \; > /evidence/manifest_$(date +%Y%m%d_%H%M%S).sha256
# Sign the manifest
gpg --armor --detach-sign /evidence/manifest_$(date +%Y%m%d_%H%M%S).sha256
Legal Notification Matrix
Consult Legal before sending any notification. Timing and content have legal implications.
GDPR (EU / EEA)
| Notification | Recipient | Deadline | Trigger |
| DPA notification | Lead Supervisory Authority | 72 hours from when breach was "known" | Any personal data breach |
| Individual notification | Affected EU data subjects | "Without undue delay" | High risk to individuals' rights |
| DPO notification | Internal Data Protection Officer | Immediately | All breaches |
GDPR Article 33 DPA Notification must include:
□ Nature of the breach (categories + approx. number of records)
□ DPO contact details
□ Likely consequences of the breach
□ Measures taken or proposed
Note: "Likely" not "confirmed" — notify even under uncertainty; supplement later.
HIPAA (US — Health)
| Notification | Recipient | Deadline | Trigger |
| HHS OCR notification | U.S. Dept of HHS | 60 days from discovery | Any unsecured PHI breach |
| Individual notification | Affected individuals | 60 days from discovery | All HIPAA breaches |
| Media notification | Prominent media in affected state | 60 days from discovery | >500 affected in a single state |
| Business Associate notification | Covered Entity (if you are a BA) | 60 days | BA must notify CE |
HIPAA Breach Notification letter must include:
□ Description of what happened (date, date discovered)
□ Types of PHI involved
□ Steps individuals should take to protect themselves
□ What you are doing to investigate and prevent recurrence
□ Contact information (toll-free number active for 90 days)
U.S. State Breach Notification Laws
| State | Law | Deadline | Trigger | Recipient |
| California | CCPA / AB 1130 | Expedient / "Most expedient time" | PI of CA residents | CA AG + affected residents |
| California | SB 46 (login credentials) | Expedient | Credentials breached | CA AG + individuals |
| New York | SHIELD Act | Expedient | NY residents' private info | NY AG + individuals |
| New York | NYDFS Part 500 | 72 hours | Cybersecurity event (covered entities) | NYDFS (online portal) |
| Massachusetts | 201 CMR 17 | Expedient | MA residents | MA AG + individuals |
| Texas | TBIA | 60 days | TX residents | TX AG + individuals |
| Florida | FDBNA | 30 days | FL residents | FL AG + individuals |
Multi-state breach: apply the strictest applicable deadline across all states. Consult counsel for simultaneous filings.
Federal Sector-Specific Requirements
| Regulation | Sector | Deadline | Recipient |
| SEC Rule 10-K / 8-K | Public companies | 4 business days (material) | Form 8-K Item 1.05 to SEC EDGAR |
| GLBA Safeguards Rule | Financial institutions | 30 days (FTC rule) | FTC + affected customers |
| FISMA | Federal agencies | 1 hour (US-CERT) | CISA / US-CERT |
| FERPA | Educational institutions | Expedient | Parents / eligible students |
| COPPA | Child-directed services | Expedient | FTC |
International Notifications
| Country/Region | Law | Deadline | Recipient |
| UK | UK GDPR / DPA 2018 | 72 hours | ICO (ico.org.uk) |
| Canada | PIPEDA | Expedient (significant harm) | OPC + affected individuals |
| Australia | Privacy Act (NDB Scheme) | 30 days (once eligible) | OAIC + affected individuals |
| Brazil | LGPD | "Reasonable timeframe" / ANPD guidance: 2 business days | ANPD + affected individuals |
| Singapore | PDPA | 3 business days (notifiable) | PDPC + affected individuals |
Breach Notification Letter Templates
Individual Notification — Generic PII Breach
Subject: Important Notice About Your Personal Information
[Organization Letterhead]
[Date]
Dear [Name / "Valued Customer"],
We are writing to inform you of a data security incident that may have affected
your personal information held by [Organization Name].
WHAT HAPPENED
On [date], we discovered that [brief, plain-language description of the incident].
We believe this incident occurred between [start date] and [end date].
WHAT INFORMATION WAS INVOLVED
The information that may have been affected includes: [list specific data elements —
e.g., name, email address, date of birth, account number].
[If SSN/financial]: We have no evidence that this information has been misused,
but we are providing this notice out of an abundance of caution.
WHAT WE ARE DOING
We have [taken the following steps...]. We are also [working with law enforcement /
a leading cybersecurity firm / regulators] to investigate and prevent recurrence.
WHAT YOU CAN DO
- Review your account statements for unusual activity
- Consider placing a free credit freeze with the three major bureaus (Equifax,
Experian, TransUnion)
- Monitor your credit report at AnnualCreditReport.com
- [If SSN involved: Consider an IRS Identity Protection PIN]
FOR MORE INFORMATION
If you have questions, please contact our dedicated response line:
Phone: [toll-free number — active for minimum 90 days]
Email: [dedicated breach response email]
Hours: [business hours]
We sincerely apologize for this incident and any concern it may cause.
Sincerely,
[Name, Title]
[Organization]
Regulatory Body Contact Information
| Regulator | Jurisdiction | Contact |
| HHS OCR | HIPAA (US) | hhs.gov/ocr/privacy |
| FTC | GLBA, COPPA (US) | ftc.gov/report |
| SEC | Public companies (US) | sec.gov/tcr |
| CISA | Federal / Critical Infra (US) | cisa.gov/report |
| FBI IC3 | All cyber incidents (US) | ic3.gov |
| ICO | UK GDPR | ico.org.uk |
| EDPB | EU GDPR (coordination) | edpb.europa.eu |
| NY AG | NY SHIELD Act | ag.ny.gov/internet-bureau |
| NYDFS | NY financial entities | dfs.ny.gov |
| CA AG | CCPA | oag.ca.gov/privacy |
| OAIC | Australia Privacy Act | oaic.gov.au |
| PDPC | Singapore PDPA | pdpc.gov.sg |
- [ ] Patch or mitigate the vulnerability exploited for exfiltration
- [ ] Close the data access path that was abused (overly permissive access, unprotected bucket)
- [ ] Review and tighten DLP policy thresholds
- [ ] Implement additional data access controls (zero trust, JIT access for sensitive data stores)
5.2 Credit Monitoring / Identity Protection (if PII breached)
- [ ] Engage credit monitoring vendor (Experian, Kroll, AllClear ID) for affected individuals
- [ ] Duration: typically 12–24 months free credit monitoring
- [ ] Budget: ~$5–15/person/year depending on service level
5.3 Post-Incident Review
- [ ] Root cause analysis: how was data exfiltrated? What control failed?
- [ ] DLP policy review: would better DLP rules have prevented or detected this earlier?
- [ ] Data minimization: is all this data still necessary? Implement retention limits.
- [ ] Access control review: were users over-permissioned for the data they could access?
Incident Runbook Checklist
Detection & Triage
- [ ] Breach trigger confirmed as true positive
- [ ] IR Lead, Legal, Privacy Officer on bridge
- [ ] Data classification complete — regulated data confirmed in scope
- [ ] Regulatory clock start time documented
Contain
- [ ] Exfiltration channel blocked
- [ ] Affected endpoints isolated
- [ ] Cloud storage access revoked (if applicable)
- [ ] Attacker credentials disabled
Evidence & Scope
- [ ] All log sources preserved and hashed
- [ ] Legal hold issued
- [ ] Record count estimated
- [ ] Data subject list compiled (by jurisdiction)
Notifications
- [ ] Legal counsel reviewed all notifications before sending
- [ ] GDPR — DPA notified within 72h (if applicable) — log date/time
- [ ] HIPAA — HHS OCR notified within 60 days (if applicable) — log date
- [ ] State AG notifications sent — log dates for each state
- [ ] NYDFS/SEC/GLBA notifications sent (if applicable) — log dates
- [ ] Individual notifications drafted and approved
- [ ] Individual notifications sent — log date/method of delivery
- [ ] Cyber insurance claim filed
Recovery
- [ ] Root cause remediated
- [ ] Credit monitoring vendor engaged (if PII breach)
- [ ] Data access controls reviewed and hardened
- [ ] DLP policies updated
- [ ] Post-incident review completed and actioned