Incident Response

Incident Response

One-liner: The structured approach to detecting, containing, eradicating, and recovering from security incidents.

🎯 What Is It?

Incident Response (IR) is the methodology and process organizations use to handle security breaches and cyberattacks. A well-prepared IR capability minimizes damage, reduces recovery time, and lowers costs.

πŸ“Š Incident Response Phases (NIST)

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                                                                  β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚ Preparation │───►│  Detection  │───►│    Containment      β”‚  β”‚
β”‚  β”‚             β”‚    β”‚ & Analysis  β”‚    β”‚ Eradication Recoveryβ”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚         β–²                                         β”‚              β”‚
β”‚         β”‚           β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”           β”‚              β”‚
β”‚         └───────────│ Post-Incident   β”‚β—„β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜              β”‚
β”‚                     β”‚    Activity     β”‚                          β”‚
β”‚                     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

1. Preparation

2. Detection & Analysis

3. Containment

Short-term: Immediate actions (isolate host, block IP)
Long-term: Sustainable controls while investigating

4. Eradication

5. Recovery

6. Post-Incident Activity

πŸ“‹ Severity Levels

Level Description Response Time Example
Critical Active breach, data exfil Immediate Ransomware spreading
High Confirmed compromise < 1 hour Malware on server
Medium Suspicious activity < 4 hours Phishing click, no execution
Low Policy violation < 24 hours Unauthorized software

πŸ› οΈ Essential IR Tools

Category Tools
Forensics Volatility, Autopsy, FTK
Network Wireshark, tcpdump, Zeek
Endpoint Velociraptor, KAPE, PEStudio
SIEM Splunk, Elastic, Sentinel
Ticketing TheHive, JIRA, ServiceNow

🎀 Interview STAR Example

Situation: User reported ransomware note on their desktop Monday morning.
Task: Lead incident response to contain and recover.
Action: Immediately isolated affected host from network. Identified patient zero via EDR timeline. Found phishing email from Friday. Scanned for IOCs across all endpointsβ€”found 3 more infected. Contained all systems, restored from Thursday backups, reset credentials for affected users.
Result: Contained ransomware to 4 systems (out of 500). Full recovery in 18 hours. Implemented email filtering rule blocking similar attachments.

πŸ’‘ Interview Tips

πŸ“š References