Skip to content

hevnsnt/Awesome_Incident_Response

Repository files navigation

Awesome Incident Response Awesome

Awesome Incident Response

Welcome to "Awesome Incident Response," the ultimate open-source repository designed to simplify and guide you through the intricate world of incident response! Whether you're a seasoned cybersecurity professional or an aspiring enthusiast, this comprehensive collection of resources and tutorials will equip you with the knowledge and skills to effectively handle and mitigate security incidents. These strategies were developed with several decades of incident response experience and should guide you well through any type of cybersecurity incident.

Using this Guide:

The main page (this page) should be considered the consolidated aka the "For Dummies" version of the Awesome Incident Response guide. Each phase of Awesome Incident Response is described and gives you the best practices needed for an effecient and effective response. But if you want more detail, or need additional guidance, each section will have a [Read More] that will go more in depth.

This curated list of tools and resources is aimed at helping security leaders, analysts, and DFIR teams, and is always a work in progress. I hope you find this valuable, and as always Pull requests are encouraged and appreciated!

-Bill (hevnsnt)


FUNDING:

If you believe that a community driven, open-sourced, and validated "Awesome Incident Response" resource is valuable for the internet to reference, please consider supporting this project. You can find more information for supporting the project in the right-sidebar, or by clicking the sponsor button below. Anything you contribute is greatly appreciated and goes 100% to supporting this project!

18 Daily Visits


Text changing depending on mode. Light: 'Awesome Incident Response Logo' Dark: 'Awesome Incident Response Logo'

Contents


Preparation

Oh preparation, the most likely of all steps to be skipped, and only gets attention after the company suffered substantial losses and had to hire external consultants.

DO NOT SKIP THIS STEP

Please, do it now. You will thank me later when you do not need to hire me to help you respond to an incident.

Awesome Incident Response happens BEFORE an incident occurs. Preparation is EASY AND FUN. By preparing before a crisis occurs, you can minimize impact and ensure a quick response when faced with an attack. Also, you will look like a super hero!

The basic premise of incident management is to respond to an incident in a structured way. Large-scale incidents can be confusing; a structure that teams agree on beforehand can reduce chaos. Formulating rules about how to communicate and coordinate your efforts before disaster strikes allows your team to concentrate on resolving an incident when it occurs. If your team has already practiced and familiarized themselves with communication and coordination, they don’t need to worry about these factors during an incident.

-- Google, Incident Response

Awesome Incident Response requires a collaboration across multiple teams, this is not only for IT & Security (surprise!). Any major cyber-incident is a Company-wide crisis, and will require support from Executives, Legal, Communications, HR, Disaster Recovery, IT Operations, Development, and Security. Make sure these people know their role during an incident, and have the authority to act. This section describes how to ensure that you have the right people, capabilities, authorities, and processes in place in order to effectively respond to a crisis. Then we will discuss how to test your IR capability to validate that everything is working as expected.

Do these 7 things now to greatly improve your ability to respond to any cyber crisis:

1. Develop an Incident Response Plan and exercise it:

Your company should have a comprehensive plan in place that outlines the steps to be taken in the event of a cyber attack or breach. An Awesome Incident Response Plan (IRP) should cover several key components to ensure an effective and coordinated response to cyber incidents. The Incident Response Plan section of the Preparation Chapter goes into much more detail of what should be included in your Awesome Incident Response Plan (IRP)

After you have a plan, Exercise it! There is a saying "Train like you fight, Fight like you trained" (or something like that). Run a table top exercise and validate the controls you put into place are working as you expected! Trust me you will find something that needs some adjustment. Need a place to start for a TTX idea? Go visit @badthingsdaily and pick something that might happen to you!

2. Ensure you are logging the correct events:

I have worked thousands of incidents, and I have never seen an organization that is logging all the data sources that would have been extremely helpful for the detection and/or response. Often this is because they simply do not know what to log, or a logging solution is something they have not tackled (or received expense approval for) yet. Having a logging plan is essential, as a security leader you can’t keep going back to get more budget as new applications, services, networks, or assets are introduced to your environment. These costs need to be built into the project BEFORE it was implemented, start that understanding at an executive level now. At the very basic level, you need to be logging the most critical areas of your environment, and these logs should be located on a separate system and retained for at least 90 days. For a indepth discussion about logging, see the Logging section of the Preparation Chapter

3. Regularly update software and systems:

Keeping all software and systems up-to-date with the latest security patches and upgrades is essential. This includes not just operating systems, but also any applications and devices connected to the network. There should be a documented policy stating timelines for Critical, High, Medium, and Low severity software patches, with a documented exception process. Leverage asset tracking systems and your regular security assessments to validate that this process is working as intended. While I don't go into great detail in this guide, having a process for identifying vulnerabilities, deploying software updates, and regularly testing will go a long way to never having to leverage your incident response plan.

4. Conduct regular security assessments, and Third Party Risk Reviews:

Regular security assessments can help identify vulnerabilities in your systems before they are exploited. This can include regular penetration testing, vulnerability scans, and security audits. At the least, Vulnerability Scanning should happen monthly, with each asset on your network being scanned at least once every quarter. Penetration testing should occur at least yearly.

This isn't the Awesome Vulnerability Management plan, so I will spare you the details. But if you want less incident response (reactive) and are looking for a proactive solution, well please patch your systems, and test them often.

Over the past couple of years, a high percentage of the incidents I have worked were because a third-party had lost control of "our" data on "their" systems. You can build the most secure environment and still be working an incident response because a vendor of yours .... didn't. Knowing WHO has WHAT data and access can greatly reduce the time to identify where a security incident originated. If you have extremely critical (or secret) data residing at a 3rd party, ensure that their standards meet yours. Of course Cloud providers meet this criteria, but expand your thinking to include Law Firms, Accounting, Building Management, etc. (yikes)

5. Train employees and setup a Secure Communications Channel:

As it pertains to Awesome Incident Response, you need to train your employees how to report security incidents, and train those individuals that have a an incident response responsibility (listed above) on their specific roles. I am trying to keep this guide focused on IR, but regular training for all employees on cybersecurity best practices and the importance of data privacy is crucial. This will not only raise awareness about potential risks, but also help prevent incidents from happening in the first place.

Now would be a good time to identify a secure messaging channel, it is my recommendation that during the initial phases of an incident, to not use any corporate messaging solutions. I recommend Signal. Have every person identified as an Incident Response Team member ensure it is installed and tested. When you have an incident, create a new group chat with a codename related to the incident, and have the messages delete after 1 week. Often as the incident is spinning up, you are not confident on the full scope of the incident, and mistakes are made. Taking these actions will protect against the threat actor having inside information and legal discovery activities, but check with your legal team before you do this.

6. Establish partnerships:

Establishing partnerships with outside experts, such as cybersecurity firms or incident response teams, can provide additional support and expertise in the event of a crisis. Having these relationships in place before an incident occurs can help ensure a rapid and effective response. Right now is a good time to setup an Incident Response Retainer with an IR Firm. It can be exceedingly difficult to retain help during an incident (sometimes it can take months to get the right resources), so the sooner you have that done the better. But before you do this, please make sure you understand what your Cyber Insurance covers (and does not cover).

7. Understand what your Cyber Insurance Covers (and does not cover):

Most incident responders are technical, Awesome Incident Responders understand that a cyber incident is a Company risk. Therefore, knowing what your cyber insurance covers helps you align your incident response planning accordingly. It allows you to understand the resources and services available through your policy, such as access to incident response teams, forensic investigations, legal support, and public relations assistance. I have been a part of several incidents, where the "boots on ground" team had to stop all incident response actions, because the Cyber Insurance required their IR team to perform all actions. Knowing this prior to an incident would have helped dramatically, reduced re-work, and shortened the timeline to mitigation. This understanding ensures that your incident response plan considers the available coverage and leverages the insurance-provided resources effectively. The Preparation Chapter goes into more detail on understanding your Cyber Insurance Provider.


Identification

Before we declare an incident, we need to identify the severity and impact of a security event. This section describes the best practices for building an effective Cyber Defense team, to ensure you are correctly monitoring the correct things in your environment to quickly detect events as they occur in your environment. That said, Identification is much more than monitoring, I like to think of it as identifying all of the "Indicators of Compromise" as it pertains to the incident at hand.

Being able to fully understand the scope of a security incident, we need evidence to review. When did this happen? How long ago? How many systems are impacted? Was anything exfiltrated/destroyed? Who did this?. All of these can be answered with an Awesome Logging strategy. The logging section of the Preparation Chapter is a good starting point of systems that should be logged.

The core of Identification is triage and investigation. It's the process of taking a single indicator—an alert, a weird log entry—and building a complete picture of what's happening. This is where all that hard work you did in the Preparation phase pays off. Remember that Awesome Logging strategy we talked about? This is its time to shine. Without good data, you're flying blind. With it, you can start answering the critical questions every incident commander needs to know: Who is the attacker? What systems are they on? When did they get in? Where have they been? How did they do it? And why are they targeting us? Answering these questions quickly and accurately is the difference between a controlled response and pure chaos.

Do these 6 things to turn a confusing alert into actionable intelligence:

1. Acknowledge and Validate the Initial Alert:

Detection can come from anywhere: a SIEM alert, an EDR tool flagging a suspicious process, a user reporting a weird email, or even a call from the FBI. The first step is to acknowledge the signal and begin the validation process. A single alert is rarely enough to declare an incident. Your first responders, often the SOC, need to perform initial validation by correlating the alert with other data sources. Does that network alert match up with endpoint process logs? Does that "impossible travel" alert make sense given the user's calendar? This initial filter is crucial to weed out the false positives so the CSIRT can focus on real threats.

2. Establish Situational Awareness:

Answer the 5 W's: Once an event is validated, the Incident Commander's primary goal is to establish situational awareness. This is the detective work. You need to immediately start answering the fundamental investigative questions :

  • Who? Which user accounts are compromised? Who is the adversary?
  • What? What systems, applications, and data are affected? What is the nature of the attack (malware, data theft, etc.)?
  • When? What's the timeline? When did the initial compromise occur?
  • Where? Where in the network is the activity? Is it contained or spreading? On-prem or in the cloud?
  • How? What was the entry point? What tools and techniques are being used?

The answers to these questions form the foundation for every strategic decision you'll make next.

3. Determine the Severity and Impact:

Not all incidents are created equal. A single malware infection on a non-critical workstation is not the same as a domain controller compromise. You must use a formal process to classify the incident's severity, ensuring the response is proportional to the risk. This is where the Incident Classification Matrix from your Incident Response Plan comes into play. By evaluating the functional impact (what's broken?), the information impact (what data is at risk?), and the recoverability (how hard is it to fix?), you can assign a severity level—like Critical, High, Medium, or Low. This classification dictates everything that follows: who gets called, how fast you need to move, and what resources are mobilized.

4. Correlate, Correlate, Correlate!:

Never trust a single data point. A single alert is just a breadcrumb; it's not the whole trail. An Awesome Incident Response relies on building a case from multiple, corroborating pieces of evidence. This is where you leverage the full spectrum of logs you so diligently set up in the Preparation phase. Your job as the incident commander is to identify, obtain, and review all logs that may be relevant to the investigation.

Think of it as pivoting. You start with one piece of data and use it to find the next. Discovered a compromised user account from a suspicious VPN login? That's your starting point.

  • Pivot from the connection: What else did that attacker's source IP do? Pull the firewall, proxy, and DNS logs for that IP address at the time of the login. Did they immediately try to connect to a high-value server or resolve a known malicious domain?
  • Pivot from the identity: What other systems could that user account access? Query your identity management systems to understand the user's permissions and group memberships. This defines your potential blast radius and tells you where to hunt for lateral movement.
  • Pivot from the endpoint: What happened on the machine they logged into? Check the EDR and local event logs on that system for new processes, suspicious command line activity, or registry modifications that occurred moments after the login.

By weaving together these disparate data sources—network traffic, host-based artifacts, and identity information—you transform a single, low-confidence alert into a high-confidence, well-understood incident.

6. Start the Clock and Document Everything:

The moment you begin investigating, start a timeline. Open a case in your incident tracking system. Every action taken, every piece of evidence found, every person contacted—it all needs to be documented with a timestamp. This isn't just bureaucratic busywork. This documentation is critical for the Post-Incident review, where you'll learn from what happened. It's essential for communicating status to leadership. And if the incident leads to legal action, this contemporaneous log will be your most valuable piece of evidence. In the chaos of a response, details are easily forgotten. Write. It. Down.

6. Escalate According to the Plan:

The Security Operations Center (SOC) can handle a Low-severity incident. The full CSIRT is needed for a Medium. But a High or Critical incident? That requires bringing in the heavy hitters. Your escalation procedures, defined in the IRP, are your guide. They tell you exactly when to notify the CISO, when to bring Legal and HR into the loop, and when to get the PR team on standby. Following these procedures is not optional. It prevents the IC from having to make these calls under pressure and ensures that all stakeholders are engaged at the appropriate time, preventing confusion and enabling a coordinated, enterprise-wide response.

Read More on the Identification Chapter


Containment

The "containment" phase of incident response refers to the stage in which the primary objective is to limit the impact and scope of a security incident or breach. During this phase, the incident response team works swiftly to prevent further damage, isolate affected systems or areas, and mitigate the immediate risks associated with the incident. The containment phase is crucial in minimizing the potential harm caused by the incident and laying the foundation for subsequent recovery and remediation efforts.

Read More on the Containment Chapter


Eradication

The "eradication" phase of incident response is the stage where the incident response team focuses on completely removing the cause of the security incident or breach from the affected systems and infrastructure. The objective is to eliminate any remnants of the attacker's presence and ensure that the environment is secure and free from vulnerabilities that could be exploited in the future. The eradication phase typically follows the containment phase and precedes the recovery and lessons learned phases.

Read More on the Eradication Chapter


Recovery

The "recovery" phase of incident response refers to the stage where the focus shifts towards restoring normal business operations and returning the affected systems, networks, and data to a fully functional and secure state. The recovery phase follows the containment and eradication phases and involves activities aimed at recovering from the impact of the incident and minimizing any disruption caused to the organization. Often companies move to the recovery phase before Containment and Eradication are complete, leading to ineffective incident response and delaying a normal operating state. Do not make this mistake.

Read More on the Recovery Chapter


Lessons Learned

The "lessons learned" phase of incident response is a crucial step that occurs after the incident has been resolved and normal operations have been restored. This phase focuses on reflecting on the incident response process and identifying valuable insights, improvements, and best practices to enhance future incident response efforts. The primary goal is to learn from the incident, prevent similar incidents from occurring in the future, and strengthen the overall security posture of the organization.

Read More on the Lessons Learned Chapter


Tools Index

An amazing list of resources for an incident responder. Tools Index

Releases

No releases published

Sponsor this project

 

Packages

No packages published