Lesson 56 of 60 advanced

Branch Outage, ATM Outage & Audit Evidence

Regulated incidents require controlled response

Open interactive version (quiz + challenge)

Real-world analogy

A branch outage is a fire in the bank’s bakery — customers are hungry, staff are anxious, regulators watch the smoke. Put it out calmly, preserve the oven (evidence), and document the recipe (runbook) for next time.

What is it?

Regulated incident response connects technical fixes to policy, audit, and regulatory expectations. Juniors who can translate their work into ‘audit evidence’ are twice as useful as juniors who can only type commands.

Real-world relevance

A single branch loses connectivity at 10 AM. Junior confirms WAN link down, branch PABX still up, VPN backup fails to establish due to expired cert. Coordinates vendor, patches cert, gets WAN back at 11:15, collects timeline, ticket, approvals, cert-renewal action item, and publishes a clean audit pack by end of day.

Key points

Code example

// ATM-down first-hour checklist

[ ] Confirm scope: specific ATM? region? scheme-wide?
[ ] Snapshot switch logs with timestamps
[ ] Confirm host + switch + acquirer connectivity
[ ] Open incident with IC assigned; start timeline log
[ ] Notify comms lead + business owner (cards, retail banking)
[ ] Draft customer-facing notice (branch + app + IVR) — keep factual
[ ] Check for pending changes in the last 48h
[ ] Engage vendor / acquirer / scheme support with evidence
[ ] Update stakeholders at fixed cadence (e.g., 15 min)
[ ] Preserve evidence (logs, tickets, approvals)
[ ] After recovery: run PIR, update runbook, plan fix actions

Line-by-line walkthrough

  1. 1. ATM-down first-hour checklist
  2. 2. Confirm scope
  3. 3. Snapshot switch logs
  4. 4. Confirm connectivity chain
  5. 5. Open incident + timeline
  6. 6. Notify comms + business owner
  7. 7. Customer-facing notice
  8. 8. Check recent changes
  9. 9. Engage vendor/scheme support
  10. 10. Fixed cadence updates
  11. 11. Preserve evidence
  12. 12. Post-incident actions

Spot the bug

Senior tells junior to 'just delete the old logs, they're taking space'.
Junior deletes 180 days of SWIFT workstation logs during a live audit.
Need a hint?
What regulation, process, and trust problems does this create?
Show answer
Deleting regulatory logs — especially during audit — is a serious violation: retention rules, chain of custody, audit integrity, and possibly legal discovery duties. Never delete logs without written retention policy approval. Correct path: raise the disk-space issue through change control; move logs to compliant archive storage; get approvals and document.

Explain like I'm 5

When the bank has a bad day, don’t run around. Find out what broke, tell the right people calmly, fix it by the book, save every receipt, and explain clearly what happened afterward. That’s the whole game.

Fun fact

Mature banks treat incident writeups as learning artefacts, not punishment. Monthly or quarterly reviews of incidents across branches become the most reliable input to new detection rules, training, and process changes.

Hands-on challenge

Build a one-page ATM outage runbook for a fictional bank: scope, escalation, logs to capture, comms steps, evidence pack, RCA structure. Show it to a peer and iterate.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp