Key Takeaways

  • Preparation is 90% of successful incident response
  • Containment first - stop the bleeding before investigation
  • Document everything for legal and improvement purposes
  • Average breach detection time: 197 days

1. Incident Response Fundamentals

Incident Response (IR) is the organized approach to addressing and managing security breaches or cyberattacks. The goal is to handle the situation in a way that limits damage, reduces recovery time and costs, and prevents future incidents.

The Cost of Poor IR
  • Average cost of a data breach: $4.45 million (IBM, 2023)
  • Breaches identified in <60 days cost $1M less
  • Organizations with IR teams save $2.66M on average

2. NIST Incident Response Framework

1 Preparation

Build capabilities before incidents occur

2 Detection & Analysis

Identify and investigate the incident

3 Containment, Eradication & Recovery

Stop, remove, and restore

4 Post-Incident Activity

Learn and improve

3. Preparation Phase

Essential Preparations

# Jump Bag Essentials (Physical IR Kit)
- Forensic laptop with write blockers
- USB drives with forensic tools
- Network cables and adapters
- External hard drives
- Faraday bags (for mobile devices)
- Documentation forms
- Chain of custody forms

4. Detection & Analysis

Common Detection Sources

Initial Triage

# Key questions to answer:
# 1. What type of incident is this?
# 2. What systems are affected?
# 3. Is it ongoing or past?
# 4. What's the potential impact?
# 5. Who needs to be notified?

# Severity classification:
# Critical: Active data exfiltration, ransomware executing
# High: Confirmed compromise, lateral movement detected
# Medium: Suspected compromise, anomalous behavior
# Low: Policy violation, minor malware

5. Containment Strategies

Short-term Containment

# Network isolation
# - Disable switch port
# - Move to quarantine VLAN
# - Block at firewall

# Windows: Disable network adapter
netsh interface set interface "Ethernet" disable

# Block C2 at firewall
iptables -A OUTPUT -d malicious-ip -j DROP

# Disable compromised account
net user compromised_user /active:no
# Azure AD
Set-AzureADUser -ObjectId USER_ID -AccountEnabled $false

Long-term Containment

# Patch vulnerable systems
# Rebuild compromised systems from known-good images
# Change all potentially compromised credentials
# Implement additional monitoring

# Password reset (all users after major breach)
Set-ADAccountPassword -Identity USER -Reset
# Force password change at next logon
Set-ADUser -Identity USER -ChangePasswordAtLogon $true

6. Eradication & Recovery

Eradication Steps

Recovery

# Recovery priority order:
# 1. Critical business systems
# 2. Authentication systems (AD, SSO)
# 3. Communication systems (email)
# 4. Other business systems
# 5. User workstations

# Restore from clean backups
# Rebuild if backup integrity uncertain
# Enhanced monitoring during recovery
# Phased return to production

7. Digital Forensics Basics

Evidence Collection

# Memory acquisition (before shutdown!)
winpmem_mini_x64.exe memory.raw

# Disk imaging
dd if=/dev/sda of=/mnt/evidence/disk.img bs=4M
# Or use FTK Imager on Windows

# Network traffic capture
tcpdump -i eth0 -w capture.pcap

# Log collection
# Windows Event Logs: Security, System, Application
# Linux: /var/log/auth.log, /var/log/syslog
# Web server logs, firewall logs, proxy logs

Analysis Tools

8. IR Playbooks

Ransomware Playbook

# IMMEDIATE ACTIONS (First 30 minutes)
1. Isolate affected systems from network
2. Identify ransomware variant (ransom note, extensions)
3. Check for available decryptors (NoMoreRansom.org)
4. Preserve evidence (memory dump before shutdown)
5. Notify IR lead and management

# DO NOT:
- Pay ransom (fuels criminal enterprise)
- Negotiate without legal/FBI guidance
- Wipe systems (destroys evidence)
- Restore from potentially infected backups

Phishing Playbook

# If user clicked link:
1. Isolate user's system
2. Check what credentials were entered
3. Reset affected passwords immediately
4. Check for malware on system
5. Review user's recent email activity

# If user opened attachment:
1. Isolate system immediately
2. Memory and disk acquisition
3. Scan for indicators of compromise
4. Check for lateral movement
5. Block similar attachments at email gateway

FAQ

Should we involve law enforcement?
For significant breaches, yes. FBI Cyber Division, CISA, and local law enforcement can provide resources and intelligence. They won't "take over" your investigation unless requested.
How long should we retain logs?
Minimum 90 days for security logs, ideally 1 year. Some regulations (PCI DSS) require specific retention periods. More logs = better investigation capability.

Malware Analysis AD Security Lateral Movement