Incident response basics
Topic: Security basics
Summary
When a security incident occurs, contain impact, preserve evidence, eradicate the cause, and recover. Have a plan and roles defined in advance; use runbooks for common scenarios. Use this when building or executing an incident response process.
Intent: How-to
Quick answer
- Contain: limit further damage (isolate host, revoke credentials, block IP). Do not destroy evidence; take memory and disk images if needed before reimaging.
- Preserve: collect logs, timelines, and artifacts; store in a safe place. Document what you did and when so the timeline is clear for later analysis or legal.
- Eradicate and recover: remove the cause (malware, backdoor, weak config); patch and harden; restore from clean backup if needed. Then review and update controls to reduce recurrence.
Prerequisites
Steps
-
Detect and classify
Confirm it is a security incident (not a normal failure). Classify severity and scope (single host, account, network). Assign an incident lead and start a timeline log.
-
Contain
Stop the spread: revoke compromised credentials, isolate affected systems, block malicious IPs or domains. Preserve evidence (logs, snapshots) before reimaging or wiping.
-
Eradicate and recover
Remove the cause: patch, remove malware, fix misconfig. Restore from known-good backup if necessary. Harden so the same vector cannot be used again.
-
Post-incident
Document what happened, what was done, and what was learned. Update runbooks, detection, and controls. Share lessons (blameless where appropriate) so the organization improves.
Summary
Contain impact, preserve evidence, eradicate the cause, and recover. Have a plan and runbooks; document the timeline and lessons. Use this to respond to security incidents in a structured way.
Prerequisites
Steps
Step 1: Detect and classify
Confirm the incident; classify severity and scope. Assign a lead and start a timeline.
Step 2: Contain
Revoke credentials, isolate systems, block malicious traffic. Preserve evidence before making destructive changes.
Step 3: Eradicate and recover
Remove the cause; patch and harden; restore from clean backup if needed. Prevent the same vector from working again.
Step 4: Post-incident
Document cause, response, and lessons. Update runbooks and controls; share learnings.
Verification
Incident is contained and resolved; evidence is preserved; cause is addressed; runbooks and controls are updated.
Troubleshooting
Unknown scope — Assume broader compromise until proven otherwise; revoke and isolate, then narrow. No runbook — Follow contain, preserve, eradicate, recover; write a runbook after the incident.