Get Secured

Process Security, Pillar 02

Incident Response Planning
& Tabletop Exercises.

When an exploit hits, the clock starts immediately. Funds move in seconds. The first fifteen minutes determine whether you contain the damage or watch it compound. Teams that have a practiced incident response plan move fast and make fewer mistakes. Teams that improvise under pressure make the decisions that cost them everything.

The Service

Web3 Incident Response Plans, Playbooks & Security Operations Rehearsal

Incident response planning for Web3 is categorically different from traditional IT security operations. A DeFi protocol under active exploit cannot simply "take the system offline", pausing a contract may itself require a multi-sig approval process that takes minutes, while an attacker drains funds in a single block. The response must be faster, more rehearsed, and more specifically adapted to on-chain constraints than any enterprise incident response framework provides for.

We build incident response plans and runbooks tailored to your specific protocol, your multi-sig configuration, your team structure, and the threat scenarios most relevant to your architecture. We then test those plans through tabletop exercises, structured simulations that expose gaps, build team muscle memory, and ensure that the first time anyone asks "who calls the pause function?" is not during an actual exploit.

What We Deliver

Work is delivered through our internal consultancy team and a curated network of specialist partner firms, rigorously vetted for technical depth and professional integrity in the Web3 space.

  • Incident response plan (IRP): end-to-end playbook from detection through containment, recovery, and disclosure
  • Threat-specific runbooks: separate playbooks for exploit, governance attack, key compromise, and insider threat
  • On-chain emergency procedures: pause function ownership, multi-sig emergency paths, and circuit breaker design
  • Communications plan: internal escalation chains, community disclosure timing, and regulatory notification requirements
  • Threat detection coverage: monitoring hooks, alert thresholds, and on-call escalation procedures
  • Tabletop exercises: facilitated scenario simulations with your full response team, identifying gaps before a real event does
  • Post-incident review framework: structured analysis process to extract lessons and update defences after any security event
Request an IRP Engagement →

Speed Saves Funds. Euler Proved It.

“When Euler Finance lost $197M to a flash loan attack in March 2023, the team activated their emergency pause mechanism within hours of detecting the exploit, freezing further withdrawals and preserving a portion of user funds. They then opened on-chain communication with the attacker and began negotiations. By April 2023, $176M, 90% of the stolen amount, had been returned. The pause mechanism existed. The team had rehearsed using it. That rehearsal was the difference between a contained incident and total loss.”
Security4Web3 Incident Analysis

KyberSwap: When There Is No Plan

“The KyberSwap exploit in November 2023 ($48M) hit multiple chains simultaneously. By the time the team understood the full scope, funds had already been drained from Arbitrum, Optimism, Ethereum, Polygon, and Base. There was no pre-agreed cross-chain pause procedure, no documented escalation path for a multi-chain simultaneous attack, and no runbook for on-chain attacker communication. The team improvised under pressure, in public, in real time. Tabletop exercises are designed to surface exactly those gaps before an attacker does.”
Security4Web3 Incident Analysis

Security operations for Web3 protocols require SOC-level preparation without the enterprise SOC infrastructure. We bring that capability to teams of any size, designing the detection, escalation, and response processes that let you move at the speed a blockchain incident demands.

The Framework

Incident Response Across
Five Phases.

A complete Web3 incident response plan covers five phases, each with specific owners, decision points, and time constraints. Most DeFi teams have informal coverage of one or two. We build all five.

Detection & Triage

On-chain monitoring alerts, anomaly detection thresholds, and the immediate triage process that determines whether an event is an exploit, an operational error, or a false positive. Who receives the alert, how they assess it, and what the decision threshold is for escalating to full incident response.

Containment

Pause function activation, liquidity removal, frontend takedown, and any other containment action specific to your protocol. Who executes each action, in what order, and what the multi-sig or single-key requirements are. Pre-staged transactions for common containment actions, ready to broadcast immediately.

Investigation & Communication

On-chain forensic analysis, root cause identification, and the simultaneous communication process, internal team alignment, community updates, whitehat outreach if applicable, and regulatory notifications where required. Communication timing is itself a security and reputational decision.

Recovery & Remediation

The structured process for patching, redeploying or upgrading contracts, restoring user access, and handling any user fund compensation. Defining the criteria for declaring the incident resolved and the conditions that must be met before the protocol resumes normal operation.

A protocol without an incident response plan is not prepared, it is hoping. When a real event occurs, the quality of your response in the first fifteen minutes is determined entirely by the preparation you did before it happened. We build the plans, run the exercises, and close the gaps that every tabletop reveals.

Start a Conversation →