IR procedures for common attack vectors, communication templates, forensics checklists, and post-mortem frameworks.