Lab 18: Incident Classification
🎯 Objective
Master the CIA Triad, understand incident severity levels (P1-P5), create incident report templates, and understand the NIST Incident Response lifecycle.
📚 Background
Incident response is the organized approach to addressing and managing the aftermath of a security breach or attack. Before responding effectively, security professionals must classify incidents correctly. The CIA Triad (Confidentiality, Integrity, Availability) provides the fundamental framework for understanding what an incident affects and how severely.
Severity classification (P1-P5 or Critical/High/Medium/Low) determines how quickly to respond, who gets notified, and what resources to deploy. A P1 (Critical) incident might mean a hospital's patient records are being actively exfiltrated — requiring immediate 24/7 response. A P5 (Informational) might be a failed login attempt from an unknown IP — log and monitor.
The NIST Computer Security Incident Handling Guide (SP 800-61) defines a structured lifecycle for incident response that has become the industry standard. Understanding this lifecycle ensures consistent, thorough handling of incidents from detection through recovery and lessons learned.
⏱️ Estimated Time
40 minutes
📋 Prerequisites
Basic cybersecurity concepts
Lab 08: Common Attack Vectors (helpful)
🛠️ Tools Used
python3— analysis and template generation
🔬 Lab Instructions
Step 1: CIA Triad Deep Dive
📸 Verified Output:
💡 What this means: Every security incident affects one or more CIA pillars. A ransomware attack primarily affects Availability. A data breach primarily affects Confidentiality. A supply chain attack affects Integrity. Identifying which pillar(s) are affected guides response priorities.
Step 2: Incident Severity Classification
📸 Verified Output:
💡 What this means: Severity classification determines resource allocation and escalation. Misclassifying a P1 as P3 can mean delayed response while an attacker pivots through the network. Most organizations use automated classification triggers (SIEM rules) for initial severity, then human review for confirmation.
Step 3: Incident Classification Matrix
📸 Verified Output:
💡 What this means: Classification should consider data sensitivity, scope, threat status, and business impact together — not just one factor. A single laptop with credential access and an active attacker can be P2 even though only one system is affected.
Step 4: Incident Report Template
📸 Verified Output:
💡 What this means: Incident reports serve multiple purposes: internal record-keeping, regulatory compliance, executive communication, and lessons-learned input. A well-structured report created during the incident (not after) is far more accurate and valuable.
Step 5: NIST Incident Response Lifecycle
📸 Verified Output:
💡 What this means: The most neglected phase is Post-Incident Activity. Organizations often move to the next crisis without learning from the last one. A 2-hour lessons-learned meeting can prevent the same attack from succeeding again.
Step 6: Incident Metrics and KPIs
📸 Verified Output:
💡 What this means: 207 days average detection time means attackers spend nearly 7 months in networks undetected on average. Every day of dwell time means more data stolen, more systems compromised, higher breach cost. Reducing MTTD from 207 days to 7 days is one of the highest-value security investments.
Step 7: Build an Incident Runbook
📸 Verified Output:
💡 What this means: Runbooks pre-document response procedures so IR analysts don't need to make decisions under pressure during an incident. The branching logic (no click → P5, clicked + credentials → P2) ensures consistent, appropriate responses.
Step 8: Regulatory Notification Requirements
📸 Verified Output:
💡 What this means: Regulatory notification requirements have strict deadlines — GDPR's 72 hours is particularly aggressive. Have legal contacts pre-established and notification templates pre-drafted so you can move quickly when needed. Missing notification deadlines can add regulatory fines on top of the breach damages.
✅ Verification
🚨 Common Mistakes
Severity inflation: Calling every incident P1 creates alert fatigue; reserve critical for genuine critical events
No escalation path: When the primary analyst isn't available, incidents stall — document backup contacts
Remediation before forensics: Cleaning a system before capturing evidence destroys the ability to understand what happened
Ignoring regulatory timelines: Missing GDPR's 72-hour window or HIPAA's 60-day window adds regulatory exposure
No post-incident review: The most common and most costly mistake — failing to learn from incidents
📝 Summary
CIA Triad (Confidentiality, Integrity, Availability) is the foundational framework for classifying what an incident affects
Severity levels (P1-P5) determine response urgency, notification requirements, and resource allocation; most incidents are P3/P4
Incident reports provide forensic documentation, executive communication, and regulatory compliance evidence
NIST lifecycle (Prepare → Detect → Contain → Eradicate → Recover → Learn) provides structure for consistent response
Regulatory notifications (GDPR 72h, HIPAA 60 days, PCI immediate) have legal deadlines — establish processes before an incident
🔗 Further Reading
Last updated
