Operations
Operations is the core of performing incident response. This is where the actions of responding and remediating security incidents occur. Operations includes the following five phases: detection, analysis, containment, eradication, and recovery. Descriptions of these phases and the goals can be found in Table 3.
Table 3 – Operations phases
Phase | Goal |
---|---|
Detection | Identify a potential security event. |
Analysis | Determine if a security event is an incident and assess the scope of the incident. |
Containment | Minimize and limit the scope of the security event. |
Eradication | Remove unauthorized resources or artifacts related to the security event. Implement mitigations that caused the security incident. |
Recovery | Restore systems to a known safe state and monitor these systems to verify that the threat does not return. |
The phases should serve as guidance when you respond to and operate on security incidents in order to respond in an effective and robust way. The actual actions you take will vary depending on the incident. An incident involving ransomware, for example, will have a different set of response steps to follow than an incident involving a public Amazon S3 bucket. Additionally, these phases do not necessarily happen sequentially. After containment and eradication, you might need to return to analysis to understand if your actions were effective.