Incident Command Platform
← Glossary

Defensible Record - Incident Documentation Standard

A defensible record is an incident documentation standard that can withstand scrutiny from regulators, auditors, courts, and plaintiffs. The defining property of a defensible record is that the record cannot be modified after the fact without detection. Defensible records are increasingly required by regulators (SEC, EU DPAs, NIS2 competent authorities) and by cyber insurance carriers as a condition of coverage.

Source: derived from regulatory expectations (SEC Item 1.05 disclosure controls, GDPR Article 5(2) accountability principle, NIS2 Article 21 governance requirements) and audit practice (SSAE 18 SOC 2, ISO/IEC 27001 Annex A).

What Makes a Record Defensible

Why It Matters

Spreadsheets, Slack messages, email threads, and shared documents are not defensible. They can be edited, deleted, or revised without detection. When regulators or plaintiffs ask whether an event happened at a specific time, the defensible record provides the answer; a Slack channel is evidence of a discussion, not of a binding event.

Defensible Record vs Audit Log

An audit log records system events (who logged in, what changed). A defensible record records incident events (what was decided, who was notified, when handoff occurred). The two are complementary but distinct. Mature programs maintain both, with the defensible record explicitly designed for human-meaningful incident events rather than system telemetry.

Build a defensible record by default

IR-OS is event-sourced with a SHA-256 hash chain, producing a defensible record regulators, courts, and auditors can verify.

Start free