What the first written summary actually looks like.
A composite incident report submitted under the CERT-In Direction at 06:30 IST after the 02:47 IST GuardDuty alert. The report has the following structure. Header: organisation name, CIN, sector (BFSI subsidiary), date and time of detection in IST, date and time of report. Incident classification: unauthorised access to cloud account, exfiltration of personal data. Resources affected: one EC2 instance (i-0abc...), one S3 bucket (kyc-prod-...) with ~412 GB of KYC documents read in the dwell window. IoC list: AccessKeyId AKIA..., source IP 203.0.113.74, user agent strings, S3 object key prefixes. Timeline in UTC and IST: initial access at the SSRF on day -18, instance credential exfiltration on day -17, S3 enumeration from day -16, exfiltration peaks on days -10 and -3, GuardDuty finding at 02:47 IST day 0, containment complete at 04:55 IST day 0. Containment actions: instance credential deactivated, quarantine SG attached, EBS snapshot snap-0def... taken, S3 bucket policy locked. Forensic artefacts: snapshot ID, dc3dd image SHA-256, CloudTrail event list export, VPC Flow Log export. Next-step plan: rotate, rebuild, enforce IMDSv2, IAM Identity Center migration. Signatory: Chief Information Security Officer, with a Sec 63(4) certificate attached for the CloudTrail and S3 access log extracts that will be lodged with the FIR.