Lab 11: Incident Response Framework
Objectives
Step 1: NIST SP 800-61 IR Lifecycle
┌──────────────┐
│ PREPARATION │ ← IR plan, playbooks, tools, training, tabletops
└──────┬───────┘
│
┌──────▼───────────────┐
│ DETECTION & │ ← SIEM alerts, threat intel, user reports
│ ANALYSIS │ Log analysis, triage, severity assessment
└──────┬───────────────┘
│
┌──────▼───────────────┐
│ CONTAINMENT, │
│ ERADICATION & │ ← Isolate, remove malware, patch, restore
│ RECOVERY │
└──────┬───────────────┘
│
┌──────▼───────────────┐
│ POST-INCIDENT │ ← Lessons learned, process improvements
│ ACTIVITY │ Threat intel update, detection improvement
└──────────────────────┘Level
Name
Examples
Response Time
Step 2: Incident Timeline Builder + Triage
Step 3: Ransomware Response Playbook
Step 4: Data Breach Response Playbook
Regulation
Notification Deadline
To Whom
Step 5: RACI Matrix
Activity
CISO
IR Lead
SOC Analyst
Legal
IT Ops
HR
Step 6: Evidence Collection
Step 7: Communication Plan
Step 8: Capstone — IR Programme Design
Summary
Concept
Key Points
Last updated
