Lab 11: Incident Response Framework

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Apply NIST SP 800-61 incident response lifecycle

  • Build IR playbooks for ransomware, breach, and insider threats

  • Define RACI matrix and communication plan

  • Implement a Python incident timeline builder


Step 1: NIST SP 800-61 IR Lifecycle

┌──────────────┐
│  PREPARATION │  ← IR plan, playbooks, tools, training, tabletops
└──────┬───────┘

┌──────▼───────────────┐
│  DETECTION &         │  ← SIEM alerts, threat intel, user reports
│  ANALYSIS            │     Log analysis, triage, severity assessment
└──────┬───────────────┘

┌──────▼───────────────┐
│  CONTAINMENT,        │
│  ERADICATION &       │  ← Isolate, remove malware, patch, restore
│  RECOVERY            │
└──────┬───────────────┘

┌──────▼───────────────┐
│  POST-INCIDENT       │  ← Lessons learned, process improvements
│  ACTIVITY            │     Threat intel update, detection improvement
└──────────────────────┘

Incident severity levels:

Level
Name
Examples
Response Time

SEV1

Critical

Ransomware, active breach, data exfil

Immediate (< 15 min)

SEV2

High

Compromised admin account, C2 detected

< 1 hour

SEV3

Medium

Phishing success, malware detection

< 4 hours

SEV4

Low

Policy violation, failed login attempts

< 24 hours


Step 2: Incident Timeline Builder + Triage

📸 Verified Output:


Step 3: Ransomware Response Playbook

Phase 1: Detect & Triage (0-15 minutes)

Phase 2: Containment (15-60 minutes)

Phase 3: Eradication (1-4 hours)

Phase 4: Recovery (4-48 hours)


Step 4: Data Breach Response Playbook

Immediate actions (< 30 minutes):

  1. Identify data types affected (PII, PAN, PHI, IP)

  2. Determine scope: how many records, which systems

  3. Revoke compromised credentials immediately

  4. Preserve log evidence (chain of custody)

  5. Engage legal/privacy team

Notification obligations:

Regulation
Notification Deadline
To Whom

GDPR

72 hours

Supervisory Authority + affected individuals

HIPAA

60 days

HHS + affected individuals (>500 records: media)

PCI DSS

Immediately

Acquirer/card brands

CCPA

"Expedient"

California AG + affected residents

State breach laws

Varies (30-90 days)

State AG + individuals

💡 Evidence preservation is critical for regulatory investigations. Do NOT turn off compromised systems without memory imaging. Use read-only forensic images (dd or FTK Imager).


Step 5: RACI Matrix

For ransomware incident:

Activity
CISO
IR Lead
SOC Analyst
Legal
IT Ops
HR

Declare incident

A/R

R

I

I

I

I

Contain affected hosts

I

A

R

-

R

-

Evidence collection

I

A

R

C

R

-

External communication

A

R

-

R

-

-

Regulatory notification

A

C

-

R

-

-

Recovery authorization

A

R

-

-

R

-

Lessons learned

I

A

R

-

C

-

HR for insider threats

I

A

-

C

-

R

RACI key: R=Responsible, A=Accountable, C=Consulted, I=Informed


Step 6: Evidence Collection

Digital forensics evidence order (RFC 3227):

  1. CPU registers, cache, running processes (most volatile)

  2. RAM / memory image

  3. Network connections (netstat, ARP table)

  4. Temporary files, swap space

  5. Hard disk / file system image

  6. Remote logging, audit logs

  7. Physical media / archived data (least volatile)

Chain of custody:


Step 7: Communication Plan

Internal notification tree:

External communication principles:

  • Never speculate about scope before knowing facts

  • Prepare holding statement within 1 hour of SEV1

  • Designate single spokesperson (CISO or Legal)

  • Customer notification via secure channel (email + website)

  • Regulator notification: documented, dated, via counsel


Step 8: Capstone — IR Programme Design

Scenario: Build IR capability for 5,000-employee healthcare organisation


Summary

Concept
Key Points

NIST SP 800-61

Prepare → Detect → Contain/Eradicate/Recover → Post-incident

SEV levels

SEV1 (critical, immediate) → SEV4 (low, 24h)

Ransomware playbook

Isolate → snapshot → eradicate → restore from backup

RACI

Clear accountability; one A per activity

Evidence

Order: volatile first (RAM) → persistent (disk)

Chain of custody

Hash, document, secure storage

Notifications

GDPR 72h, HIPAA 60 days, PCI immediate

Last updated