ForgeSDLC
Navigate
Home
Discover ForgeSDLC (101)
Practice (201)
Master (301)

This page is part of the ForgeSDLC knowledge base — an AI-assisted, human-directed methodology for taking product work from concept to production. For the core operating model and vocabulary, see Forge SDLC overview and What is ForgeSDLC?.

Security incident response

Purpose: A project-agnostic blueprint for preparing, detecting, containing, and learning from security incidents with clear roles, communications, and evidence handling.

Audience: Security operations, engineering leadership, legal/compliance, and communications stakeholders.


Overview

Incident response (IR) is how an organization limits harm, restores trust, and improves after a security event. A strong program combines written plans, rehearsed playbooks, instrumented detection, and blameless learning — not heroics under pressure.


Incident classification

Severity Definition (typical) Examples Response SLA (indicative) Communication Escalation
Critical Active compromise of prod, large-scale data exposure, ransomware in progress Domain admin compromise, widespread data exfiltration Minutes to engage IC Exec + legal + comms + customer/regulator path as required C-level, 24/7 bridge
High Confirmed breach limited scope, critical vuln exploited, major service impact from attack Single tenant data access, successful auth bypass in prod Under 1 hour Security + engineering leadership + legal triage Director+
Medium Suspicious activity unconfirmed, limited asset, contained issue Possible account takeover, isolated malware on endpoint Same business day Team leads + security Manager+
Low Policy violations, noise, near-misses Phishing reported no creds lost, scan noise Next business day Team channel / ticket On-call security

Calibrate SLAs and regulatory triggers (e.g., GDPR breach assessment) with counsel — this table is a template, not legal advice.


NIST incident response lifecycle

flowchart LR P[Preparation] --> D[Detection and Analysis] D --> C[Containment] C --> E[Eradication] E --> R[Recovery] R --> L[Post-Incident Activity] L --> P

Post-incident activity feeds preparation through updated controls, training, and detection rules.


IR plan components (preparation)

Component Contents
Roles and responsibilities Roster, backups, delegation rules
Contact lists On-call, vendors, cloud support, law enforcement liaison
Communication templates Internal status, customer holding statements, regulator outlines
Legal / PR coordination When counsel approves external messaging; privilege considerations
Evidence preservation Log retention, imaging steps, chain-of-custody form
Tabletop schedule Quarterly critical scenarios, annual full-scale exercise

IR team roles

Role Responsibilities Skills
Incident Commander (IC) Objectives, scope, approvals, resource allocation Crisis leadership, technical literacy
Security Analyst Triage alerts, hypothesis testing, IOC hunting SIEM, endpoint, cloud logging
Forensics Lead Disk/memory capture, timeline, malware analysis Forensic tools, evidence handling
Communications Lead Status updates, stakeholder alignment Clear writing under pressure
Legal Counsel Regulatory duties, privilege, contracts Privacy and breach law
Engineering Lead Patches, isolations, service recovery System architecture, change management

Detection and analysis — IoC types

Category Examples Collection
Network IPs, domains, TLS cert anomalies, beaconing Firewall, DNS, NIDS, proxy logs
Host File hashes, registry keys, persistence EDR, OS audit, integrity monitoring
Application Failed logins, privilege spikes, odd API sequences App logs, WAF, IdP
Behavioral Lateral movement, impossible travel, data staging UEBA, correlation rules, baselines

SIEM correlation and threat intelligence (TI feeds, ISACs) accelerate triage; tune alerts to actionable scenarios.


Critical incident response flow (sequence)

sequenceDiagram participant Mon as Monitoring participant SOC as SOC Analyst participant IC as Incident Commander participant War as War room participant Comms as Comms participant Eng as Engineering participant PM as Postmortem Mon->>SOC: Alert or report SOC->>IC: Triage and escalate IC->>War: Assign roles and objectives War->>War: Containment decision IC->>Comms: Stakeholder updates War->>Eng: Investigation and remediation Eng->>War: Recovery and hardening War->>PM: Blameless postmortem PM->>Mon: Detection and control improvements

Containment strategies

Incident type Short-term containment Long-term containment / eradication
Malware Isolate host; block C2 at network Reimage; patch vector; EDR policy updates
Data breach Revoke tokens; block exfil paths Fix root cause; encryption; DLP tuning
Credential compromise Force reset; revoke sessions MFA enforcement; password policy; hunt for reuse
DDoS Mitigation provider; rate limits Architecture hardening; upstream filtering
Insider threat Suspend access; preserve logs HR/legal process; least-privilege redesign

Evidence preservation

  • Chain of custody: who collected, when, where stored, integrity hashes
  • Forensic imaging: bit-for-bit copies; write blockers; documented procedures
  • Log preservation: centralized, tamper-resistant storage; legal hold on deletion
  • Timeline reconstruction: SIEM queries, EDR storylines, mail logs — tools vary by stack (e.g., Volatility, Autopsy, KAPE for endpoint forensics)

Communication plan

Stakeholder Typical trigger
Engineering / SRE Any confirmed incident affecting systems
Security leadership Medium+ or regulatory touch
Executive / board High/Critical or reputational risk
Customers Contractual commitment or material impact
Regulators Jurisdiction-specific (e.g., GDPR 72-hour assessment clock for many personal-data breaches; HIPAA breach notification rules for covered entities)

Use pre-approved templates and single narrative owner to avoid contradictory statements.


Recovery and lessons learned

  • Restore services with verified clean builds where appropriate
  • Enhance monitoring and detection for observed TTPs
  • Run a blameless postmortem: timeline, root cause, contributing factors, action items with owners
  • Track improvements in the same system as other engineering work

Tabletop exercises

Aspect Guidance
Scenario design Realistic for your stack; inject comms and legal twists
Frequency At least annual full exercise; quarterly focused drills
Participants IC, security, eng, legal, comms as applicable
Facilitation Pre-read, timed injects, clear success criteria
Outcomes Document gaps, update runbooks, assign remediation

Incident response tools

Category Examples
SIEM Splunk, Elastic, Microsoft Sentinel
SOAR Palo Alto XSOAR, Tines, Shuffle
Forensics Volatility, Autopsy, KAPE
Paging / coordination PagerDuty, Opsgenie

Metrics

Metric Meaning
MTTD Mean time to detect
MTTA Mean time to acknowledge
MTTC Mean time to contain
MTTR Mean time to resolve (define consistently)
Incident frequency Trends by category
Postmortem completion rate % incidents with closed action items

Anti-patterns

Anti-pattern Risk
No IR plan Chaotic response; evidence loss
Hero-dependent response Bus factor; inconsistent outcomes
Blame culture Hides facts; weak learning
No postmortems Repeated failures
Forensic evidence destruction Legal and regulatory exposure

External references


Keep project-specific security documentation in docs/security/, threat models in docs/security/threat-models/, and security decisions in docs/adr/, not in this file.