Intro
Historically, cybersecurity teams relied on a linear, step-based Incident Response model—typically 6 to 8 stages. While still widely recognized, this traditional method is sequential, rigid, and slower to adapt to the speed of modern cyber threats. It followed a waterfall-style progression, often delaying containment and collaboration until late in the incident lifecycle.
Below is the traditional model for context:
1. Preparation
- Establish policies, playbooks, and communication plans
- Maintain detection tools (SIEM, EDR, IDS)
- Train team members & run tabletop exercises
- Maintain asset inventories and critical-system owners
2. Detection & Analysis
- Monitor alerts, logs, threat intel, and user reports
- Triage events for severity and scope
- Collect forensic data
- Classify incidents (malware, phishing, breach, unauthorized access, etc.)
3. Containment
- Isolate affected hosts, accounts, or networks
- Block malicious traffic
- Apply temporary controls
- Preserve evidence
4. Eradication
- Remove malware or unauthorized changes
- Patch vulnerable systems
- Reset compromised accounts
- Eliminate IOCs
5. Recovery
- Restore from clean backups
- Validate system integrity
- Monitor for reinfection
6. Post-Incident Review
- Document timeline and actions
- Capture lessons learned
- Update policies and controls
- Report to leadership
Roles Within SIRT
- Incident Response Manager: Leads and coordinates overall response
- Security Analysts (Tier 1–3): Investigate alerts, perform triage and deep analysis
- Forensic Specialist: Handles evidence preservation and data recovery
- Threat Intelligence Analyst: Enriches investigations with intel and context
- Communications Lead: Manages internal/external communications
- IT/Infrastructure Liaison: Executes technical remediation actions
- Legal/Compliance Advisor: Guides regulatory and breach-notification requirements
Objectives of the IR Process
- Minimize impact on operations
- Protect sensitive data and intellectual property
- Restore normal functioning quickly
- Ensure compliance with legal and regulatory requirements
- Strengthen organizational security posture through continuous improvement