โ† Back to home
Blue Team DFIR SOC SANS NIST Playbooks
Advanced

Incident Response Plan (IRP)

Aug 20, 2024

100% cybersecurity doesn't exist. Sooner or later, defenses will fall. The Incident Response Plan (IRP) defines exactly what to do when that happens to minimize impact, expel the attacker, and recover operations. We use the industry-standard SANS Institute (PICERL) framework.

The 6 Phases of Incident Response (PICERL)

1. Preparation

90% of incident response success relies on this phase. You cannot defend what you don't know exists.

2. Identification (Detection)

The moment alarms trigger (EDR alerts, SIEM rules, or users reporting anomalies).

# Common alert triage:
- Impossible travel logins.
- Base64 encoded PowerShell execution.
- Midnight outbound traffic spikes (Exfiltration).

๐Ÿ”ด SOC Simulator (Triage & Containment)

Our IDS detected anomalous activity on a web server. Put on your Tier 2 SOC Analyst hat: Analyze the intercepted log, find the Indicator of Compromise (IoC), and block the enemy IP on the firewall before it's too late.

>_ START CTF 08 CHALLENGE

3. Containment

Stop the bleeding. GOLDEN RULE: Do not power off the infected machine! Powering it off destroys RAM memory where malware hides keys and active processes.

4. Eradication

Remove the root cause and backdoors left by the attacker.

# Typical eradication tasks:
- Delete persistence mechanisms (Cron jobs, Run registry keys).
- Remove unauthorized user accounts.
- Patch the exploited vulnerability.

5. Recovery

Carefully return systems to production.

6. Lessons Learned

Write a post-mortem report: What happened? Why? What did we do right/wrong? How do we prevent it next month?