<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/b0f0a570-2206-4724-918c-b77cfef5e8d6/info-duotone.svg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/b0f0a570-2206-4724-918c-b77cfef5e8d6/info-duotone.svg" width="40px" /> A brief overview of the incident
Provide a high-level summary of what happened, including a brief description of the incident, its impact, and the resolution.
</aside>
<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/b0f0a570-2206-4724-918c-b77cfef5e8d6/info-duotone.svg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/b0f0a570-2206-4724-918c-b77cfef5e8d6/info-duotone.svg" width="40px" /> Essential details about the incident.
Include key information such as the date, time, and nature of the incident.
</aside>
<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/bf129564-015a-49d2-b876-cb8a8fbb0524/info-duotone.svg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/bf129564-015a-49d2-b876-cb8a8fbb0524/info-duotone.svg" width="40px" /> A chronological sequence of events during the incident.
Document the timeline of events, providing detailed descriptions of what happened at each significant moment.
</aside>
<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/9144261f-8b91-42a9-8259-aa06392c8e43/info-duotone.svg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/9144261f-8b91-42a9-8259-aa06392c8e43/info-duotone.svg" width="40px" /> Conditions that contributed to the incident.
List the conditions and factors that contributed to the incident. These are the circumstances that allowed the incident to occur or worsen.
</aside>
<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/9abe8b18-0553-409d-b5bc-40ff7d127964/info-duotone.svg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/9abe8b18-0553-409d-b5bc-40ff7d127964/info-duotone.svg" width="40px" /> The root cause of the incident.
Provide a detailed explanation of the root cause, including any contributing factors and how it was identified.
</aside>
<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/2a6f2cdf-ab96-4688-bc40-199afda152f9/info-duotone.svg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/78418bb0-8c45-499b-9c77-33262b06421f/2a6f2cdf-ab96-4688-bc40-199afda152f9/info-duotone.svg" width="40px" /> The impact of the incident
Describe the impact on users, systems, and the business. Include details on how customers and internal processes were affected.
</aside>