Preparation (step one): Incident response step that concerns the establishment of guidelines/policies to ensure the organization can handle a security incident.
Detection (step two): The process of identifying potential security incidents through monitoring systems (e.g., SIEMs), and system logs.
Analysis (step three): The process of evaluating whether a security incident is truly malicious or worth organization attention.
Containment (step four): Limiting the security incident/breach to the affected systems or networks (e.g., quarantining infected machines/files).
Eradication (step five): Removing the source of contamination/the cause of the security incident - stopping the security incident in progress.
Recovery (step six): Restoring systems and operations to normal after a security incident, including the removal of malware, restoring data from backups, and implementing fixes to prevent future occurrences.
Lessons learned (step seven): Reflecting on how the security incident occurred, and implementing any changes to ensure the organization will not have a similar security breach.
Training: Educating/teaching staff on the actions to do during a security incident - this can have a critical impact on successful incident response outcomes.
Testing: Exercises to help staff develop incident response competencies and can help to identify deficiencies in the procedures and tools.
Tabletop exercise: The least costly type of testing. The facilitator presents a scenario, and the responders explain what action they would take to identify, contain, and eradicate the threat. Scenario data is presented as flashcards.
Simulation: A team-based exercise where one team (red team) attempts an intrusion, and another team (blue team) operates response and recovery, while a white team moderates/evaluates the exercise. Requires considerable investment and planning.
Root cause analysis: This process involves identifying the underlying factors that contributed to a security incident, allowing teams to develop improved strategies and mitigate future risks.
Threat hunting: Proactively looking for IoCs (Indicators of Compromise) within a network or system to identify potential threats before they cause significant damage.
Digital forensics: Post-mortem analysis of an incident to understand how it occurred, its root cause, and to obtain evidence that may be used in legal proceedings.
Legal hold: Data acquisition request that preserves electronically stored information (ESI) to ensure that it is not altered or destroyed during an investigation.
Chain of custody: A legal document that tracks the possession of digital evidence - this ensures it has not been tampered with and proves court admissibility.
Acquisition: The process of obtaining evidence during digital forensics.
Reporting: Providing documentation for the security incident, the data acquired, and the process of acquiring the relevant digital information.
Preservation: Storage of data acquired during digital forensics - more volatile data (CPU registers, temporary files, RAM), is stored before less volatile data (SSDs/HDDs, network topology configs, archival media).
E-discovery: The process of collecting, preparing, reviewing, interpreting, and producing electronic documents.