Lab 18: Incident Classification

🎯 Objective

Master the CIA Triad, understand incident severity levels (P1-P5), create incident report templates, and understand the NIST Incident Response lifecycle.

📚 Background

Incident response is the organized approach to addressing and managing the aftermath of a security breach or attack. Before responding effectively, security professionals must classify incidents correctly. The CIA Triad (Confidentiality, Integrity, Availability) provides the fundamental framework for understanding what an incident affects and how severely.

Severity classification (P1-P5 or Critical/High/Medium/Low) determines how quickly to respond, who gets notified, and what resources to deploy. A P1 (Critical) incident might mean a hospital's patient records are being actively exfiltrated — requiring immediate 24/7 response. A P5 (Informational) might be a failed login attempt from an unknown IP — log and monitor.

The NIST Computer Security Incident Handling Guide (SP 800-61) defines a structured lifecycle for incident response that has become the industry standard. Understanding this lifecycle ensures consistent, thorough handling of incidents from detection through recovery and lessons learned.

⏱️ Estimated Time

40 minutes

📋 Prerequisites

  • Basic cybersecurity concepts

  • Lab 08: Common Attack Vectors (helpful)

🛠️ Tools Used

  • python3 — analysis and template generation

🔬 Lab Instructions

Step 1: CIA Triad Deep Dive

📸 Verified Output:

💡 What this means: Every security incident affects one or more CIA pillars. A ransomware attack primarily affects Availability. A data breach primarily affects Confidentiality. A supply chain attack affects Integrity. Identifying which pillar(s) are affected guides response priorities.

Step 2: Incident Severity Classification

📸 Verified Output:

💡 What this means: Severity classification determines resource allocation and escalation. Misclassifying a P1 as P3 can mean delayed response while an attacker pivots through the network. Most organizations use automated classification triggers (SIEM rules) for initial severity, then human review for confirmation.

Step 3: Incident Classification Matrix

📸 Verified Output:

💡 What this means: Classification should consider data sensitivity, scope, threat status, and business impact together — not just one factor. A single laptop with credential access and an active attacker can be P2 even though only one system is affected.

Step 4: Incident Report Template

📸 Verified Output:

💡 What this means: Incident reports serve multiple purposes: internal record-keeping, regulatory compliance, executive communication, and lessons-learned input. A well-structured report created during the incident (not after) is far more accurate and valuable.

Step 5: NIST Incident Response Lifecycle

📸 Verified Output:

💡 What this means: The most neglected phase is Post-Incident Activity. Organizations often move to the next crisis without learning from the last one. A 2-hour lessons-learned meeting can prevent the same attack from succeeding again.

Step 6: Incident Metrics and KPIs

📸 Verified Output:

💡 What this means: 207 days average detection time means attackers spend nearly 7 months in networks undetected on average. Every day of dwell time means more data stolen, more systems compromised, higher breach cost. Reducing MTTD from 207 days to 7 days is one of the highest-value security investments.

Step 7: Build an Incident Runbook

📸 Verified Output:

💡 What this means: Runbooks pre-document response procedures so IR analysts don't need to make decisions under pressure during an incident. The branching logic (no click → P5, clicked + credentials → P2) ensures consistent, appropriate responses.

Step 8: Regulatory Notification Requirements

📸 Verified Output:

💡 What this means: Regulatory notification requirements have strict deadlines — GDPR's 72 hours is particularly aggressive. Have legal contacts pre-established and notification templates pre-drafted so you can move quickly when needed. Missing notification deadlines can add regulatory fines on top of the breach damages.

✅ Verification

🚨 Common Mistakes

  • Severity inflation: Calling every incident P1 creates alert fatigue; reserve critical for genuine critical events

  • No escalation path: When the primary analyst isn't available, incidents stall — document backup contacts

  • Remediation before forensics: Cleaning a system before capturing evidence destroys the ability to understand what happened

  • Ignoring regulatory timelines: Missing GDPR's 72-hour window or HIPAA's 60-day window adds regulatory exposure

  • No post-incident review: The most common and most costly mistake — failing to learn from incidents

📝 Summary

  • CIA Triad (Confidentiality, Integrity, Availability) is the foundational framework for classifying what an incident affects

  • Severity levels (P1-P5) determine response urgency, notification requirements, and resource allocation; most incidents are P3/P4

  • Incident reports provide forensic documentation, executive communication, and regulatory compliance evidence

  • NIST lifecycle (Prepare → Detect → Contain → Eradicate → Recover → Learn) provides structure for consistent response

  • Regulatory notifications (GDPR 72h, HIPAA 60 days, PCI immediate) have legal deadlines — establish processes before an incident

🔗 Further Reading

Last updated