Incident Response Framework¶
This document defines the standard Incident Response (IR) lifecycle for the organization's Security Operations Center (SOC), aligned with NIST SP 800-61r2 and ISO/IEC 27035. It serves as the master reference for all IR activities — all playbooks, procedures, and templates derive from this framework.
Overview¶
graph LR
A["🛡️ 1. Preparation"] --> B["🔍 2. Detection & Analysis"]
B --> C["🔒 3. Containment"]
C --> D["🧹 4. Eradication"]
D --> E["🔄 5. Recovery"]
E --> F["📝 6. Lessons Learned"]
F --> A
B -.->|False Positive| A
| Phase | Objective | Key Activities | Owner |
|---|---|---|---|
| Preparation | Readiness | Tools, training, playbooks | SOC Manager |
| Detection & Analysis | Identify & triage | Alert triage, classification, investigation | Tier 1–2 Analyst |
| Containment | Limit damage | Isolate, block, preserve evidence | Tier 2–3 Analyst |
| Eradication | Remove threat | Clean, patch, harden | Tier 2–3 + IT Ops |
| Recovery | Restore operations | Re-deploy, monitor, validate | IT Ops + SOC |
| Lessons Learned | Improve | PIR, update rules, metrics | SOC Manager |
1. Preparation¶
Preparation ensures the SOC has the people, processes, and technology ready to respond effectively.
1.1 People¶
| Area | Requirements |
|---|---|
| Staffing | Adequate coverage per SOC Team Structure |
| Training | Analysts trained on all playbooks and IR procedures quarterly |
| On-Call | Escalation roster maintained and tested monthly |
| Communication | Contact lists for management, legal, PR, law enforcement |
1.2 Technology¶
| Tool Category | Purpose | Status Check |
|---|---|---|
| SIEM | Log aggregation, correlation, alerting | Daily health check |
| EDR | Endpoint detection, isolation, forensics | Agent coverage ≥ 95% |
| SOAR | Automated triage, enrichment, response | Playbook test monthly |
| Network | NSM, IDS/IPS, PCAP, NetFlow | Sensor coverage verified |
| Ticketing | Case management, SLA tracking | Queue reviewed per shift |
| TI Platform | IoC feeds, enrichment APIs | Feed freshness < 24h |
| Forensics | Disk/memory/network acquisition tools | Tools tested quarterly |
1.3 Documentation¶
- IR Plan reviewed and approved by management annually
- All playbooks current and tested via tabletop exercises
- Communication templates pre-drafted (internal, customer, regulatory, media)
- Legal counsel and PDPA notification process documented
1.4 Readiness Metrics¶
| Metric | Target | Measurement |
|---|---|---|
| Playbook coverage (MITRE ATT&CK) | ≥ 80% of top techniques | Quarterly review |
| IR drill frequency | ≥ 1 per quarter | Drill log |
| Analyst certification rate | ≥ 70% | Training records |
| Contact roster accuracy | 100% | Monthly validation |
2. Detection & Analysis¶
The most critical phase — correctly identifying real threats and filtering noise.
2.1 Alert Sources¶
graph TD
SIEM["SIEM Alerts"] --> Triage
EDR["EDR Alerts"] --> Triage
Email["Email Gateway"] --> Triage
Users["User Reports"] --> Triage
TI["Threat Intel"] --> Triage
Triage["🔍 Triage Queue"]
Triage --> Classify{Classification}
Classify -->|True Positive| Incident["Open Incident"]
Classify -->|False Positive| FP["Close & Tune"]
Classify -->|Suspicious| Investigate["Investigate Further"]
2.2 Triage Process (Tier 1)¶
| Step | Action | SLA |
|---|---|---|
| 1 | Acknowledge — Pick up alert from queue | < 10 min |
| 2 | Context — Check affected user, source IP, asset criticality | — |
| 3 | Enrich — Query TI feeds (VirusTotal, AbuseIPDB, URLScan) | — |
| 4 | Correlate — Search SIEM for related events (±1 hour window) | — |
| 5 | Classify — Assign: TP / FP / Suspicious | < 30 min |
| 6 | Route — TP → Open incident, FP → Close & tune, Suspicious → Escalate | — |
📚 Detailed procedure: Tier 1 Runbook
2.3 Classification¶
| Dimension | Options | Reference |
|---|---|---|
| Severity | Critical · High · Medium · Low | Severity Matrix |
| Category | Phishing · Malware · Ransomware · Account Compromise · DDoS · Insider · Data Breach · etc. | Incident Classification |
| Priority | P1 (Immediate) · P2 (Urgent) · P3 (Normal) · P4 (Low) | Escalation Matrix |
2.4 Investigation (Tier 2)¶
When an alert is classified as a true positive or requires further investigation:
- Scope — Determine affected assets, users, and data
- Timeline — Build event timeline using SIEM, EDR, and network logs
- Root Cause — Identify initial access vector and attack path
- Impact — Assess business impact and data exposure
- IoC Extraction — Document all IoCs (IPs, domains, hashes, email addresses)
📚 Log sources: Log Source Matrix
3. Containment¶
Objective: Stop the bleeding — limit attacker access and prevent further damage while preserving evidence.
3.1 Containment Strategy¶
| Type | Actions | When to Use |
|---|---|---|
| Short-term | Isolate host (EDR), block IP/domain (FW), disable account (IAM), quarantine email | Immediately upon confirmation |
| Long-term | Patch vulnerability, apply network segmentation, enforce MFA, revoke API keys | After initial containment |
3.2 Containment Decision Matrix¶
| Severity | Auto-Contain? | Approval Required? | Communication |
|---|---|---|---|
| Critical | ✅ Yes (EDR auto-isolate) | Post-action notification to Manager | Immediate escalation to CISO |
| High | ⚠️ Partial (block IoCs) | SOC Lead approval | Email to SOC Manager |
| Medium | ❌ No | Analyst judgment | Ticket update |
| Low | ❌ No | Not required | Ticket update |
3.3 Evidence Preservation¶
⚠️ Before eradication, always preserve:
- Memory dump of affected systems
- Disk image (if warranted by severity)
- Network captures (PCAP)
- Relevant log exports
- Screenshots of attacker artifacts
📚 Detailed procedure: Forensic Investigation
4. Eradication¶
Objective: Completely remove the threat from the environment.
4.1 Eradication Actions¶
| Threat Type | Eradication Steps |
|---|---|
| Malware | Remove malicious files, registry keys, scheduled tasks; scan with updated signatures |
| Compromised Account | Reset credentials, revoke sessions, review account activity |
| Vulnerability Exploit | Apply patch, update WAF rules, verify fix |
| Persistence Mechanism | Remove backdoors, rogue services, unauthorized SSH keys |
| Data Staging | Remove exfiltration tools, review data access logs |
4.2 Verification¶
- Run full scan on all affected systems
- Verify no remaining IoCs in SIEM (24-hour lookback)
- Confirm all compromised credentials have been rotated
- Validate no persistence mechanisms remain
- Test that containment blocks are effective
5. Recovery¶
Objective: Safely restore systems to normal operations with enhanced monitoring.
5.1 Recovery Steps¶
| # | Step | Owner | Verification |
|---|---|---|---|
| 1 | Deploy clean/patched systems | IT Ops | System integrity check |
| 2 | Restore from clean backups (if needed) | IT Ops | Data integrity validation |
| 3 | Re-enable network connectivity | Network Team | Traffic monitoring |
| 4 | Re-enable user accounts | IAM Team | Access review |
| 5 | Enhanced monitoring period | SOC | 24–72 hour watch |
5.2 Enhanced Monitoring Period¶
| Severity | Monitoring Duration | Focus Areas |
|---|---|---|
| Critical | 72 hours | Re-infection, lateral movement, data exfiltration |
| High | 48 hours | Persistence, C2 communication |
| Medium | 24 hours | Similar alerts, related accounts |
| Low | Normal monitoring | Standard alerting |
6. Lessons Learned¶
Objective: Continuously improve IR capabilities based on real incidents.
6.1 Post-Incident Review (PIR)¶
PIR must be conducted within 72 hours of incident closure for High/Critical incidents.
| Agenda Item | Questions to Answer |
|---|---|
| Timeline Review | What happened and when? Were SLAs met? |
| Detection | How was it detected? Could we have detected it faster? |
| Response | Was the response effective? What went well / poorly? |
| Communication | Was stakeholder communication adequate and timely? |
| Root Cause | What enabled the attack? What control failed? |
| Improvements | What specific changes will prevent recurrence? |
6.2 PIR Outputs → Actions¶
| Output | Action Required | Owner | Deadline |
|---|---|---|---|
| Detection gap identified | Create/update detection rule | Detection Engineer | 1 week |
| Playbook inadequacy | Update/create playbook | SOC Analyst (T2+) | 2 weeks |
| Process failure | Update SOP | SOC Manager | 2 weeks |
| Training gap | Schedule training session | Training Lead | 1 month |
| Technology gap | Submit requirement to budget | CISO | Next cycle |
6.3 Metrics to Track¶
| Metric | Definition | Target |
|---|---|---|
| MTTD | Mean Time To Detect | < 30 minutes |
| MTTR | Mean Time To Respond | < 60 minutes (Critical/High) |
| MTTA | Mean Time To Acknowledge | < 10 minutes |
| FPR | False Positive Rate | < 10% |
| Closure Rate | Incidents closed within SLA | ≥ 95% |
| PIR Completion | PIR conducted within 72h | 100% (Critical/High) |
📚 Detailed metrics: SOC Metrics & KPIs · KPI Dashboard
Severity → Response Time Matrix¶
Quick reference for SLA targets across all phases:
| Severity | MTTA | MTTD | Containment | Eradication | Recovery | PIR |
|---|---|---|---|---|---|---|
| Critical | 5 min | 15 min | 1 hour | 4 hours | 24 hours | Required (72h) |
| High | 10 min | 30 min | 4 hours | 24 hours | 48 hours | Required (72h) |
| Medium | 30 min | 2 hours | 24 hours | 72 hours | 1 week | Recommended |
| Low | 1 hour | 8 hours | 72 hours | 1 week | 2 weeks | Optional |
RACI Matrix¶
| Activity | SOC Analyst | SOC Lead | SOC Manager | CISO | IT Ops | Legal |
|---|---|---|---|---|---|---|
| Alert Triage | R | A | I | — | — | — |
| Investigation | R | A | I | — | C | — |
| Containment | R | A | I | I | C | — |
| Eradication | R | A | I | — | R | — |
| Recovery | C | I | A | I | R | — |
| Communication (Internal) | — | R | A | I | — | C |
| Communication (External) | — | — | R | A | — | R |
| PIR | R | R | A | I | C | — |
R = Responsible, A = Accountable, C = Consulted, I = Informed
Related Documents¶
- Tier 1 Runbook — Step-by-step triage procedure
- Severity Matrix — Classification criteria
- Incident Classification — Taxonomy and categories
- Escalation Matrix — Escalation paths and SLAs
- Forensic Investigation — Evidence handling procedures
- Communication Templates — Pre-drafted notifications
- Incident Report Template — Post-incident documentation
- Shift Handoff Standard — Operational continuity
Playbooks¶
- PB-01 Phishing · PB-02 Ransomware · PB-03 Malware
- PB-04 Account Compromise · PB-05 DDoS · PB-06 BEC
- Full playbook list →