Skip to the content.

Incident Response

Terminologies

Understanding incident response begins with knowing the terms for various cyberattacks.

Terminology Description
Breach The loss of control or unauthorized access to personally identifiable information. (NIST SP 800-53 Rev. 5)
Event Any observable occurrence in a network or system. (NIST SP 800-61 Rev. 2)
Exploit A specific attack that targets a system vulnerability.
Incident An unplanned event impacting the confidentiality, integrity, or availability of information, requiring a response.
Intrusion An event where an intruder gains or attempts to gain unauthorized system access. (IETF RFC 4949 Ver. 2)
Threat A circumstance or event with the potential to harm organizational operations, assets, or individuals through unauthorized access or data destruction. (NIST SP 800-30 Rev. 1)
Vulnerability A weakness in a system or security process that could be exploited by a threat source. (NIST SP 800-30 Rev. 1)
Attacks Deliberate actions or activities carried out by threat actors with the intent to exploit vulnerabilities.
Zero Day An unknown system vulnerability that could be exploited without typical detection or prevention.
Impact The expected harm from unauthorized data disclosure, modification, or loss.

Indicators of Compromise

Indicators of Compromise (IOCs) are evidence or clues that suggest a computer system or network has been breached or compromised by malicious actors. These indicators can take various forms and are used by cybersecurity professionals to detect, investigate, and respond to security incidents.

To learn more, see Indicators of Compromise.

Goal of Incident Response

The objectives of Incident Response:

Incident Response Lifecycle

Incident Response Plan

The incident response policy aligns with the plan, outlining procedures and standards. Shaped by the organization’s vision, the process defines technical processes and tools used in incident response.

The phases of incident response:

Preparation

Preparation involves strengthening systems and networks to resist attacks.

Detection

The detection phase identifies the security incidents.

Analysis

Analysis involves a thorough examination and evaluation of the incident.

Digital forensics

Digital forensics plays a critical role in the analysis phase of incident response, where investigators examine collected evidence to determine what happened during a security incident and how to respond.

To learn more, please see Digital forensics.

Containment

After informing the relevant stakeholders, containment begins, and initial response actions are taken.

Eradication

Eradication begins once the incident is contained. It is focused on removing the malicious activity from a system.

Recovery

Recover is focused on restoring affected systems to their normal state after the incident.

Recovery is all about ensuring that any exploited vulnerabilities before the incident have been fully and appropriately remediated.

Post-incident Activity

This is the last phase and only happens after containment, eradication, and a full system recovery.

Incident Response Models

Leveraged Incident Response Model

Dedicated Incident Response Model

Hybrid Incident Response Model

Incident Response Team

Establishing a Security Operations Center (SOC) necessitates the creation of an efficient incident response team.

Roles

The roles:

Responsibilities

Dedicated Incident Response Teams (CIRTs/CSIRTs):

Incident Response Exercises

Incident response drills and exercises are conducted to simulate real-world scenarios and test the organization’s incident response capabilities.

Training

Training ensures staff grasp processes and priorities for incident response.

Varying Training per roles

Testing

This is the practical exercise of incident response procedures.

To learn more, please see Security Awareness.

SOAR

SOAR stands for Security Orchestration, Automation, and Response. It refers to a set of practices, processes, and technologies used by cybersecurity teams to streamline and enhance their incident response capabilities.

Here’s a breakdown of each component:


Back to main page