Security incident checklist
Topic: Security basics
Summary
When a security incident is declared, use this checklist: contain impact, preserve evidence, notify, eradicate, recover, and document. Ensures nothing is missed during a high-stress response. Use this in parallel with incident response basics.
Intent: Checklist
Quick answer
- Contain: revoke compromised credentials, isolate affected systems, block malicious IPs or domains. Do not destroy evidence; capture logs and snapshots before reimaging.
- Preserve: collect logs, timelines, and artifacts; store in a safe place. Document every action and the time it was taken so the timeline is clear for analysis and legal.
- Eradicate and recover: remove cause (malware, backdoor, weak config); patch and harden; restore from clean backup if needed. Post-incident: document cause, response, and lessons; update runbooks and controls.
Prerequisites
Steps
-
Detect and declare
Confirm it is a security incident; classify severity. Assign incident lead; start timeline log. Notify stakeholders per policy (internal, legal, regulatory as required).
-
Contain and preserve
Revoke credentials; isolate systems; block malicious traffic. Capture logs, memory, disk images if needed; do not alter evidence before capture. Store evidence securely; document chain of custody.
-
Eradicate and recover
Remove malware, backdoors, weak config; patch and harden. Restore from known-good backup if necessary. Verify systems are clean and monitoring is in place before returning to normal.
-
Post-incident
Document root cause, timeline, actions taken, and lessons. Update runbooks, detection rules, and controls. Share learnings (blameless where appropriate); schedule follow-up to close gaps.
Summary
Checklist for security incidents: contain and preserve, then eradicate and recover, then document and improve. Use this so nothing is missed during response.
Prerequisites
Steps
Step 1: Detect and declare
Confirm incident; classify; assign lead; start timeline. Notify per policy.
Step 2: Contain and preserve
Revoke, isolate, block. Capture evidence without altering it; store and document.
Step 3: Eradicate and recover
Remove cause; patch and harden; restore if needed. Verify before resuming normal operations.
Step 4: Post-incident
Document cause, response, lessons. Update runbooks and controls; share learnings.
Verification
Incident is contained and resolved; evidence is preserved; cause is addressed; runbooks and controls are updated.
Troubleshooting
Scope unclear — Assume broader until proven otherwise; contain broadly then narrow. No runbook — Follow this checklist and write a runbook from the outcome.