This page is part of the ForgeSDLC knowledge base — an AI-assisted, human-directed methodology for taking product work from concept to production. For the core operating model and vocabulary, see Forge SDLC overview and What is ForgeSDLC?.
Security incident response
Purpose: A project-agnostic blueprint for preparing, detecting, containing, and learning from security incidents with clear roles, communications, and evidence handling.
Audience: Security operations, engineering leadership, legal/compliance, and communications stakeholders.
Overview
Incident response (IR) is how an organization limits harm, restores trust, and improves after a security event. A strong program combines written plans, rehearsed playbooks, instrumented detection, and blameless learning — not heroics under pressure.
Incident classification
Severity
Definition (typical)
Examples
Response SLA (indicative)
Communication
Escalation
Critical
Active compromise of prod, large-scale data exposure, ransomware in progress
Domain admin compromise, widespread data exfiltration
Minutes to engage IC
Exec + legal + comms + customer/regulator path as required
C-level, 24/7 bridge
High
Confirmed breach limited scope, critical vuln exploited, major service impact from attack
Single tenant data access, successful auth bypass in prod
Possible account takeover, isolated malware on endpoint
Same business day
Team leads + security
Manager+
Low
Policy violations, noise, near-misses
Phishing reported no creds lost, scan noise
Next business day
Team channel / ticket
On-call security
Calibrate SLAs and regulatory triggers (e.g., GDPR breach assessment) with counsel — this table is a template, not legal advice.
NIST incident response lifecycle
flowchart LR
P[Preparation] --> D[Detection and Analysis]
D --> C[Containment]
C --> E[Eradication]
E --> R[Recovery]
R --> L[Post-Incident Activity]
L --> P
Post-incident activity feeds preparation through updated controls, training, and detection rules.
IR plan components (preparation)
Component
Contents
Roles and responsibilities
Roster, backups, delegation rules
Contact lists
On-call, vendors, cloud support, law enforcement liaison
Failed logins, privilege spikes, odd API sequences
App logs, WAF, IdP
Behavioral
Lateral movement, impossible travel, data staging
UEBA, correlation rules, baselines
SIEM correlation and threat intelligence (TI feeds, ISACs) accelerate triage; tune alerts to actionable scenarios.
Critical incident response flow (sequence)
sequenceDiagram
participant Mon as Monitoring
participant SOC as SOC Analyst
participant IC as Incident Commander
participant War as War room
participant Comms as Comms
participant Eng as Engineering
participant PM as Postmortem
Mon->>SOC: Alert or report
SOC->>IC: Triage and escalate
IC->>War: Assign roles and objectives
War->>War: Containment decision
IC->>Comms: Stakeholder updates
War->>Eng: Investigation and remediation
Eng->>War: Recovery and hardening
War->>PM: Blameless postmortem
PM->>Mon: Detection and control improvements
Containment strategies
Incident type
Short-term containment
Long-term containment / eradication
Malware
Isolate host; block C2 at network
Reimage; patch vector; EDR policy updates
Data breach
Revoke tokens; block exfil paths
Fix root cause; encryption; DLP tuning
Credential compromise
Force reset; revoke sessions
MFA enforcement; password policy; hunt for reuse
DDoS
Mitigation provider; rate limits
Architecture hardening; upstream filtering
Insider threat
Suspend access; preserve logs
HR/legal process; least-privilege redesign
Evidence preservation
Chain of custody: who collected, when, where stored, integrity hashes
Keep project-specific security documentation in docs/security/, threat models in docs/security/threat-models/, and security decisions in docs/adr/, not in this file.