Incident Response Guide

NIST IR Phases

PhaseKey Activities
1. PreparationIR plan, runbooks, tools, team roles, contact lists, training
2. Detection & AnalysisAlert triage, scope assessment, severity classification, timeline
3. ContainmentShort-term (isolate), long-term (patch/block), evidence preservation
4. EradicationRemove malware/backdoors, patch vulnerabilities, harden systems
5. RecoveryRestore from clean backup, monitor closely, gradual return to production
6. Post-IncidentRoot cause analysis, timeline documentation, lessons learned, process updates

Severity Classification

SeverityDefinitionResponse Time
P1 — CriticalActive breach, data exfiltration, ransomware, system shutdownImmediate (24/7)
P2 — HighConfirmed compromise, service degradation, suspicious admin access1 hour
P3 — MediumMalware detected, unauthorized access attempt, policy violation4 hours
P4 — LowPhishing attempt, vulnerability scan detected, minor anomaly24 hours

Containment Checklist

  • Isolate affected systems from network (not shutdown — preserve forensic evidence)
  • Block attacker's IPs/domains at firewall and DNS level
  • Disable compromised accounts immediately
  • Revoke compromised API keys, tokens, certificates
  • Capture memory dumps and disk images before changes
  • Preserve logs (rotate to secure storage)
  • Notify legal, compliance, and management
  • Assess whether breach notification is legally required (GDPR, etc.)

Evidence Collection

  • System logs (auth, application, OS events)
  • Network captures (pcap files)
  • Memory dumps (volatility for analysis)
  • Process list and running services at time of incident
  • List of open network connections
  • File system timeline (recently modified files)
  • DNS query logs
  • Browser history and email logs if relevant