1/23
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Incident Response Process
Outlines structured approach to manage and mitigate security incidents effectively
Incident
Act of violating an explicit or implied security policy
Incident Response Procedures
Guidelines for handling security incidents
Incident Response Cycle Phase 1
Preparation
Incident Response Cycle Phase 2
Detection
Incident Response Cycle Phase 3
Analysis
Incident Response Cycle Phase 4
Containment
Incident Response Cycle Phase 5
Eradication
Incident Response Cycle Phase 6
Recovery
Incident Response Cycle Phase 7
Post-incident activity/Lessons learned
Preparation
Strengthening systems and networks to resist attacks; Getting ready for future incidents
Detection
Identifies security incidents
Analysis
Involves a thorough examination and evaluation of the incident; Stakeholders are informed, containment begins, and initial response actions are taken
Containment
Limits the incident's impact by securing data and protecting business operations
Eradication
Aims to remove malicious activity from the system or network
Recovery
Restores systems and services to their secure state after an incident
Post-incident activity/Lessons learned
Spend time analyzing incident and response to it to make sure everything was as efficient as it should be
Root Cause Analysis
Identifies the incident's source and how to prevent it in the future
Root Cause Analysis Step 1
Define/scope the incident
Root Cause Analysis Step 2
Determine the causal relationships that led to the incident
Root Cause Analysis Step 3
Identify an effective solution
Root Cause Analysis Step 4
Implement and track the solutions
Lessons Learned Process
Document experiences during incidents in a formalized way
After-Action Report
Collects formalized info about what occurred