Incident Response

Overview

Incident response (IR) is the structured process for detecting, containing, and recovering from security incidents. This section follows the SANS PICERL incident response lifecycle: preparation, identification, containment, eradication, recovery, and lessons learned. Two common incident types — ransomware and phishing — are covered with dedicated playbooks.

Topics

  • IR Preparation — building an IR program, team structure, playbooks, communication plans, and tooling
  • Identification — detecting incidents, initial triage, scoping, and evidence preservation
  • Containment — short-term and long-term containment strategies for hosts, accounts, and networks
  • Eradication — removing threat actor access, cleaning persistence, and verifying elimination
  • Recovery — restoring systems, validating integrity, monitoring for reinfection, and lessons learned
  • Ransomware Response — ransomware-specific playbook covering detection, containment, decryption, and recovery
  • Phishing Incident Response — phishing-specific playbook covering email analysis, credential reset, and user notification

SANS PICERL Incident Response Lifecycle

┌─────────────┐    ┌────────────────┐    ┌──────────────┐    ┌──────────────┐
│ Preparation │───>│ Identification │───>│ Containment  │───>│ Eradication  │
└─────────────┘    └────────────────┘    └──────────────┘    └──────────────┘
                                                                     │
                  ┌─────────────────┐    ┌──────────────┐            │
                  │ Lessons Learned │<───│   Recovery   │<───────────┘
                  └─────────────────┘    └──────────────┘