Incident Response

Incident Response

An incident is an occurrence that may result in the loss or disruption of an organization's operations, services, or functions. Incident response refers to an organization's efforts to identify, analyze, and correct hazards in order to avoid recurrence. An incident response team or a crisis management team typically handles these incidents within a structured organization.

The incident response policy should include a reference to an incident response plan that all employees, regardless of their role in the process, will follow. The plan may include several incident response procedures and standards. It is a physical embodiment of an organization's incident response policy.

The incident response process should be guided by the organization's vision, strategy, and mission.

Procedures for putting the plan into action should outline the technical processes, methodologies, checklists, and other tools that teams will employ when responding to an incident.

To prepare for incidents, the following elements are commonly found in an incident response plan:

  1. Preparation: It is nearly impossible to create a well-organized response to a cybersecurity threat in the heat of the moment. To give your organization a fighting chance, an incident response plan must be carefully prepared in advance of an attack. To do so, your organization must conduct a risk assessment that identifies and addresses all potential threats both within and outside of your organization. Once assessed, there should be consistent maintenance to prevent attacks. For example, if your information system has a vulnerability as a result of a recent update, make sure it is patched immediately and maintained over time. Otherwise, cyber attackers will exploit that critical vulnerability to gain access to your system.

  • Develop a policy approved by management.
  • Identify critical data and systems, single points of failure.
  • Train staff on incident response.
  • Implement an incident response team
  • Practice Incident Identification. (First Response)
  • Identify Roles and Responsibilities.
  • Plan the coordination of communication between stakeholders.

2. Detection and Analysis: The process of identifying threats by actively monitoring assets and detecting anomalies is known as incident detection (NIST, 2018). Once a threat is identified, appropriate steps are taken to neutralize the threat (if it is active at the time of the response) and investigate the incident.

  • Monitor all possible attack vectors.
  • Analyze incident using known data and threat intelligence.
  • Prioritize incident response.
  • Standardize incident documentation.

3. Containment: The actions required to prevent the incident or event from spreading across the network. Eradication: The actions that are required to completely wipe the threat from the network or system. Recovery: The actions required to bring back the network or system to its former functionality and use.

  • Gather evidence.
  • Choose an appropriate containment strategy.
  • Identify the attacker.
  • Isolate the attack.

5. Post Incident Activity: Key to continuous improvement is iterating on the outcomes of your incidents and simulations in order to improve your capabilities to effectively detect, respond to, and investigate possible security incidents, reducing your possible vulnerabilities, time to response, and return to safe operations.

  • Identify evidence that may need to be retained.
  • Document lessons learned.

Incident Response Team

The incident response plan for the organization should be covered in team members' training. Typically, team members help with the event investigation, damage assessment, evidence gathering, reporting of the incident, and beginning of recovery operations. Additionally, they would assist with root cause analysis and take part in the stages of remediation and lessons learned. Many organizations now have a dedicated team in charge of investigating any computer security incidents. These groups are often referred to as computer incident response teams (CIRTs) or computer security incident response teams (CSIRTs) (CSIRTs). When an incident occurs, the response team is responsible for four primary tasks:

  • Determine the amount and scope of damage caused by the incident.
  • Determine whether any confidential information was compromised during the incident.
  • Implement any necessary recovery procedures to restore security and recover from incident-related damage.
  • Supervise the implementation of any additional security measures necessary to improve security and prevent recurrence of the incident.

To learn more visit:


To view or add a comment, sign in

More articles by Righteous Ofuka

  • Why Are Companies Migrating to Cloud?

    Over the past few years, there has been a significant shift in the way companies manage their IT infrastructure. More…

  • Security Compliance and Identity fundamentals in Microsoft Azure.

    Microsoft Azure AD is a cloud-based identity and access management service. It is designed to enable access to…

  • Access Control Concepts

    A control is a safeguard or defense mechanism intended to protect data's confidentiality, integrity, and availability…

  • Governance Elements and Processes

    Governance Element Every company or organization has a purpose for existing, whether that purpose is to produce raw…

    1 Comment
  • Understand Security Controls

    What are Security Controls? Security controls applies to the physical, technical and administrative mechanisms that act…

    1 Comment
  • Understand the Risk Management Process

    What is Risk? Risk is the measure of the extent to which an entity is threatened by a potential circumstance or event…

  • Understand the Security Concepts of Information Assurance

    CIA Triad It’s common to use Confidentiality, Integrity and Availability, also known as the CIA triad, when defining…

    3 Comments
  • Why Cyber Security Is Important.

    The World Now Revolves Around The Internet. We live in a digital world, a world where our personal, work, and even our…

Insights from the community

Others also viewed

Explore topics