graphgrc

Incident Response Process

Process for responding to security incidents from detection through resolution.

Roles and Responsibilities

Prerequisites

Process Steps

Step 1: Detection and Reporting

Incident is detected via automated alert or reported by user/third party.

Detection sources:

Actions:

Owner: Anyone (reporter), Security Team (triage) Duration: Immediate

Step 2: Initial Assessment

On-call security engineer performs initial triage and assigns severity.

Assessment criteria:

Severity assignment: See incident-response-standard.md

Actions:

Owner: Security Team Duration: 15 minutes for Sev 1/2, 1 hour for Sev 3/4

Step 3: Containment

IC coordinates immediate containment to prevent further damage.

Containment actions (examples):

Goal: Stop the bleeding, preserve evidence

Owner: Security Team, Infrastructure Team Duration: 15-30 minutes for Sev 1, 1-2 hours for Sev 2/3

Step 4: Investigation

Security team investigates root cause and determines full scope.

Investigation tasks:

Tools: Log analysis (CloudWatch Insights, Athena), forensics (disk imaging if needed)

Owner: Security Team Duration: Hours to days depending on complexity

Step 5: Eradication

Remove attacker access and remediate root cause.

Eradication actions:

Owner: Security Team, Infrastructure Team, Engineering Team Duration: Hours to days

Step 6: Recovery

Restore systems to normal operation.

Recovery actions:

Owner: Infrastructure Team Duration: Minutes to hours

Step 7: Communication

Notify stakeholders based on severity and impact.

Internal communication:

External communication:

Owner: Incident Commander, Legal, Executive Team Duration: Varies (GDPR 72 hours deadline)

Step 8: Post-Incident Review

Conduct blameless retrospective within 7 days of incident closure.

Review topics:

Deliverable: Post-incident report with lessons learned

Owner: Security Team Duration: 1-2 hour meeting, written report within 7 days

Step 9: Follow-up Actions

Implement improvements identified in post-incident review.

Examples:

Owner: Security Team, Engineering Team Duration: Weeks (tracked in backlog)

Validation and Evidence

Severity-Specific Response Times

References

Control Mapping


Referenced By

This section is automatically generated by make generate-backlinks. Do not edit manually.