Hook / Why this matters
๐ฏ CISSP Lens
Pick answers that align business risk, governance intent, and practical control execution.
You do not rise to the level of your incident response plan. Under pressure, people fall back on what they have practiced. A realistic, well exercised plan is essential for handling major incidents calmly and effectively.
Core concept explained simply
Incident response is a structured lifecycle that helps organizations handle security events in a consistent way.
The classic phases are:
- Preparation. Build capabilities, write plans, and train people before anything happens.
- Detection and analysis. Identify potential incidents and confirm their nature and scope.
- Containment. Limit damage while preserving options for investigation and recovery.
- Eradication. Remove the root cause and any remaining malicious artifacts.
- Recovery. Restore systems and services to normal operation safely.
- Lessons learned. Review the incident, update plans, and improve controls.
Roles and responsibilities
A usable incident response plan clearly defines who does what. Typical roles include:
- Incident commander. Owns overall coordination and decision making.
- Technical leads. Perform detailed analysis and remediation.
- Communications lead. Handles internal and external messaging.
- Legal and compliance contacts. Advise on regulatory and contractual obligations.
- Business owners. Decide acceptable downtime and trade offs during response.
Contact lists must be kept current, with primary and backup contacts for each role.
Communication plans
Communication failures can cause as much damage as the incident itself.
An effective plan describes:
- How incidents are declared and who must be notified.
- Which channels to use if normal systems are affected.
- What information can be shared with staff, executives, regulators, customers, and partners.
Pre approved templates for notifications and status updates reduce delays and mistakes when emotions are high.
Evidence handling and chain of custody
During response, the team must balance speed with evidence preservation.
Key practices include:
- Capturing system images or memory before wiping or rebuilding systems when feasible.
- Preserving relevant logs and preventing them from being overwritten.
- Documenting who collected evidence, when, and under what conditions.
Proper evidence handling supports internal investigations and can be critical if legal or regulatory actions follow.
Playbooks for common incident types
The high level plan should be supported by specific playbooks for common scenarios such as:
- Ransomware on servers or endpoints
- Phishing campaigns that capture credentials
- Lost or stolen laptops or mobile devices
- Insider data exfiltration
Playbooks give teams a starting point and reduce the need to improvise under stress.
Tabletop exercises and drills
Tabletop exercises simulate incidents in a low risk environment. Participants walk through a scenario, discuss decisions, and practice communication.
Benefits include:
- Revealing gaps in contact lists, escalation paths, or technical capabilities
- Building relationships across security, IT, legal, HR, and business units
- Giving teams confidence that the plan is realistic
After each exercise, the organization should update the incident response plan and related procedures.
CISSP lens
๐ Domain cross-reference
๐ Domain cross-reference
CISSP Domain 7 expects you to know incident response phases and to think like a manager.
Exam relevant themes include:
- Preparation and lessons learned are as important as containment and eradication.
- The security manager must ensure that plans are documented, communicated, and tested.
- Evidence preservation and documentation support accountability and legal needs.
On scenario questions, the best answers often focus on improving preparation, process, or communication rather than only on technical containment.
Real-world scenario
A mid sized company experiences a ransomware attack over a holiday weekend. They technically have an incident response plan, but it has not been reviewed in over a year. Several key contacts listed in the document have left the organization.
When alerts start firing, the on call engineer is unsure whom to call. It takes hours to assemble the right team. During that time, the ransomware spreads to additional systems.
Once the dust settles, the post incident review identifies several issues:
- The plan was outdated and not easily accessible.
- Roles such as incident commander and communications lead were not clearly assigned.
- There were no clear criteria for taking systems offline or disconnecting from the network.
- Logs from some systems were overwritten because no one preserved them early.
The organization responds by:
- Updating the plan, contact lists, and role assignments.
- Creating a one page quick reference guide with first steps and key contacts.
- Scheduling regular tabletop exercises that include executives and business owners.
- Adding explicit instructions on evidence preservation to relevant playbooks.
When a smaller incident occurs months later, the response is faster, more coordinated, and better documented.
Common mistakes and misconceptions
โ ๏ธ Watch for this mistake: Treating the incident response plan as a compliance document rather than a working tool.
โ ๏ธ Watch for this mistake: Allowing contact lists, systems inventories, and network diagrams to become stale.
โ ๏ธ Watch for this mistake: Failing to define who has authority to declare an incident and make business impacting decisions.
โ ๏ธ Watch for this mistake: Deleting suspicious files or wiping systems before capturing evidence.
โ ๏ธ Watch for this mistake: Ending the response once systems are back online without conducting a lessons learned review.
Actionable checklist
- โ โ Review and update your incident response plan at least annually or after major organizational changes.
- โ โ Maintain a concise quick reference sheet with roles, contact information, and the first actions to take.
- โ โ Define clear criteria for incident declaration and severity levels, along with who can make those calls.
- โ โ Include guidance on evidence preservation in playbooks, covering logs, system images, and chain of custody.
- โ โ Schedule at least one cross functional tabletop exercise per year and track the action items that result.
- โ โ After each major incident or exercise, hold a lessons learned meeting and update plans, training, and controls based on findings.
Key takeaways
- ๐ก ๐ก A shelfware incident response plan is almost as bad as having no plan.
- ๐ก ๐ก Clear roles, contact lists, and decision authority are essential for an effective response.
- ๐ก ๐ก Evidence preservation and documentation support both technical investigation and legal obligations.
- ๐ก ๐ก Exercises turn written plans into practical muscle memory and reveal hidden gaps.
- ๐ก ๐ก CISSP Domain 7 expects you to emphasize preparation and continuous improvement, not only immediate containment.
Optional exam-style reflection question
๐ Exam practice
๐ Exam practice
Question: During an incident, a system administrator deletes suspicious log files to clean up a compromised server. What key incident response principle has been violated?
Answer: Evidence preservation and proper handling. Deleting logs destroys potential evidence needed for investigation and may compromise legal or regulatory obligations. The incident response plan should instruct staff to preserve logs and other evidence until analysis is complete.