Process

Preparation

Detection

  • Setup EDR on network endpoints
  • Setup IDS
  • Set up logging with a Syslog server
  • Setup SIEM

Analysis

Containment

  • Isolate and Quarantine affected systems
  • Compromised user accounts and credentials should be disabled
  • Volatile evidence like running processes, network connection should be collected for future analysis
  • Grab a sample of malware and isolate it

Eradication

  • Destroy the root cause of incident. If its malware, then purge it
  • Delete infected files
  • Patching
  • Protect environment against future attacks

Recovery

  • Restore operations to a normal state
    • Data restoration
    • Devices brought back online
  • Reach the Recovery Point Objective as early as possible

Lessons Learned

  • Conduct a post-incident analysis