The question is not if, but when an incident will occur. Without a prepared plan, you react chaotically and make costly mistakes.
Incident response phases¶
- Preparation: Plan, tools, team, contacts
- Detection: Incident identification (SIEM, alert)
- Containment: Limit the spread (isolation, blocking)
- Eradication: Remove the root cause
- Recovery: Restore operations
- Lessons Learned: Post-mortem, improvements
Containment checklist¶
- Isolate affected systems (network segmentation)
- Revoke compromised credentials
- Block C2 communication (firewall)
- Preserve evidence (forensic image)
- Notify stakeholders
Communication template¶
Subject: [SECURITY INCIDENT] Severity: HIGH — Unauthorized Access Detected Impact: API server compromised, potential data access Status: CONTAINED Actions taken: 1. Server isolated from network 2. API keys rotated 3. Forensic image captured Next steps: - Root cause analysis - Affected data assessment - Regulatory notification (if required)
Key Takeaway¶
Have a plan BEFORE the incident. Containment first, forensics second. Document everything. Blameless post-mortem.