Chapter 8: Incident Response - Quiz¶
Instructions¶
Test your knowledge of the NIST incident response lifecycle, containment strategies, forensics, evidence preservation, lessons learned, and tabletop exercises.
Question 1: What are the four phases of the NIST Incident Response Lifecycle?
A) Detect, Analyze, Contain, Report B) Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity C) Identify, Protect, Detect, Respond D) Plan, Execute, Monitor, Close
Answer
Correct Answer: B) Preparation, Detection & Analysis, Containment/Eradication/Recovery, Post-Incident Activity
Explanation:
NIST SP 800-61 Incident Response Lifecycle:
Phase 1: Preparation - Build IR team, define roles - Deploy tools (SIEM, EDR, forensics) - Create runbooks and playbooks - Train staff
Phase 2: Detection & Analysis - Identify incidents from alerts - Triage and validate - Determine scope and severity - Initial investigation
Phase 3: Containment, Eradication & Recovery - Containment: Limit damage and prevent spread - Eradication: Remove attacker presence - Recovery: Restore systems to normal operations
Phase 4: Post-Incident Activity - Lessons learned meeting - Update runbooks and detections - Report to stakeholders - Continuous improvement
Cyclical Nature: Post-incident lessons feed back into Preparation
Reference: Chapter 8, Section 8.1 - NIST IR Lifecycle
Question 2: What is the difference between short-term containment and long-term containment?
A) Short-term is permanent, long-term is temporary B) Short-term provides immediate isolation to stop spread, long-term allows continued operations while preparing for eradication C) There is no difference D) Long-term containment is never used
Answer
Correct Answer: B) Short-term provides immediate isolation, long-term allows continued operations while preparing for eradication
Explanation:
Short-Term Containment: - Goal: Immediate threat mitigation - Timeframe: Minutes to hours - Methods: Network isolation, account disabling, process termination - Trade-off: May disrupt business operations - Example: Isolate ransomware-infected host from network (prevents spread but host is offline)
Long-Term Containment: - Goal: Maintain business operations while preparing for eradication - Timeframe: Hours to days - Methods:Segmentation, monitoring, access restrictions - Trade-off: Balances security and availability - Example: Segment compromised web server, allow read-only access while building clean replacement
Scenario: Ransomware on File Server
Short-Term Containment (Immediate):
Action: Disconnect file server from network
Impact: No file access for users
Purpose: Prevent ransomware spread to other systems
Long-Term Containment (Next 24-48 hours):
Question 3: What is the primary purpose of the eradication phase?
A) To detect the initial incident B) To completely remove the attacker's presence, including malware, backdoors, and compromised credentials C) To restore systems to normal operations D) To write the incident report
Answer
Correct Answer: B) To completely remove the attacker's presence, including malware, backdoors, and compromised credentials
Explanation:
Eradication Phase: - Goal: Eliminate threat actor presence and ensure they cannot return via existing foothold - Timing: After containment, before recovery - Critical: Incomplete eradication allows attacker to regain access
Eradication Actions:
1. Remove Malware: - Delete malicious files - Clean registry keys/scheduled tasks - Remove persistence mechanisms
2. Eliminate Backdoors: - Remove web shells - Close unauthorized remote access tools - Patch exploited vulnerabilities
3. Revoke Compromised Credentials: - Reset passwords for compromised accounts - Rotate service account credentials - Revoke/reissue certificates and API keys
4. Rebuild Compromised Systems: - Reimage infected hosts (preferred over cleaning) - Restore from known-good backups
5. Patch Vulnerabilities: - Apply security updates that closed exploit vector - Harden configurations
Example: Web Server Compromise
Eradication Checklist:
✓ Remove web shell (backdoor.php)
✓ Patch CVE-2024-12345 (initial access vector)
✓ Reset database credentials (dumped by attacker)
✓ Rebuild web server from clean image
✓ Restore website files from backup
✓ Verify no persistence mechanisms remain
Verification: Use forensics to confirm no attacker artifacts remain
Reference: Chapter 8, Section 8.3 - Eradication
Question 4: During the recovery phase, what is a critical step before restoring systems to production?
A) Immediately restore without validation B) Verify that all threats are eradicated and systems are secure before returning to production C) Delete all backups D) Skip testing and hope for the best
Answer
Correct Answer: B) Verify that all threats are eradicated and systems are secure before returning to production
Explanation:
Recovery Phase Best Practices:
Step 1: Validate Eradication
Before restoration, confirm:
✓ Malware removed (EDR scans clean)
✓ Backdoors eliminated (web shell scan negative)
✓ Vulnerabilities patched (vulnerability scan shows compliant)
✓ Credentials rotated (no compromised accounts remain)
Step 2: Test in Isolated Environment
- Restore to staging/test environment
- Monitor for 24-48 hours
- Verify no attacker activity
- Confirm business functionality
Step 3: Phased Restoration
- Restore non-critical systems first
- Monitor for issues
- Gradually restore critical systems
- Maintain enhanced monitoring for 7-30 days
Step 4: Verification
Post-recovery checklist:
✓ All services operational
✓ No security alerts
✓ Users can access systems
✓ Data integrity confirmed
Risk of Premature Restoration: - Attacker maintains persistence → re-compromise - Malware spreads from backup → reinfection - Unpatched vulnerability → immediate re-exploitation
Example: Ransomware Recovery
❌ Bad: Restore encrypted files from backup immediately
✅ Good:
1. Build new clean server
2. Patch vulnerabilities
3. Restore data to new server
4. Scan restored data for malware
5. Test in isolated network
6. Monitor for 48 hours
7. Return to production with enhanced monitoring
Reference: Chapter 8, Section 8.4 - Recovery
Question 5: What is the order of volatility for digital evidence collection?
A) Hard drive → RAM → Network traffic B) Registers/Cache → RAM → Disk → Remote logs C) Backups → Logs → RAM D) Evidence order doesn't matter
Answer
Correct Answer: B) Registers/Cache → RAM → Disk → Remote logs
Explanation:
Order of Volatility (Most to Least Volatile):
1. Registers, Cache, Routing Tables (Seconds) - CPU registers - Processor cache - Network routing tables - ARP cache
2. RAM (Memory) - (Minutes to Hours) - Running processes - Network connections - Decrypted data - Lost on reboot!
3. Temporary Filesystems (Hours to Days) - Swap/pagefile - Temporary directories
4. Disk Storage (Persistent) - Filesystem data - Event logs - Registry (Windows)
5. Remote Logs (Persistent) - SIEM logs - Network flow data - Cloud logs
6. Backups/Archives (Most Persistent) - Offline backups - Tape archives
Collection Priority:
1. FIRST: Capture RAM (memory dump)
- Use tools: FTK Imager, DumpIt, Lime
- Rationale: Lost forever on reboot
2. SECOND: Capture network traffic
- Running tcpdump/Wireshark
3. THIRD: Disk imaging
- Use tools: dd, FTK Imager, EnCase
4. FOURTH: Collect remote logs
- Export from SIEM
Critical Rule: Collect volatile evidence first, as it disappears rapidly
Reference: Chapter 8, Section 8.5 - Forensics & Evidence Collection
Question 6: What is the purpose of maintaining chain of custody for digital evidence?
A) To make evidence heavier B) To document who handled evidence, when, and why, ensuring integrity and admissibility in legal proceedings C) Chain of custody is not necessary for digital evidence D) To encrypt all evidence
Answer
Correct Answer: B) To document who handled evidence, when, and why, ensuring integrity and admissibility in legal proceedings
Explanation:
Chain of Custody: - Purpose: Prove evidence has not been tampered with - Required For: Legal proceedings, regulatory compliance, internal audits - Documentation: Who, what, when, where, why for every evidence transfer
Chain of Custody Components:
1. Initial Collection:
- Date/Time: 2026-02-15 14:30 UTC
- Collected By: Jane Doe, Senior IR Analyst
- Evidence: Memory dump from WKS-042
- Tool: FTK Imager v4.5
- Hash: SHA256: abc123def456...
- Storage: Forensic workstation, evidence locker #7
2. Transfer/Access Log:
| Date | Time | Action | Person | Purpose | Hash Verified |
|------------|-------|--------------|-------------|------------------|---------------|
| 2026-02-15 | 14:30 | Collected | Jane Doe | Incident IR-2024 | N/A |
| 2026-02-15 | 15:00 | Transferred | John Smith | Analysis | ✓ Match |
| 2026-02-16 | 09:00 | Accessed | Jane Doe | Report writing | ✓ Match |
| 2026-02-20 | 10:00 | Transferred | Legal team | Investigation | ✓ Match |
3. Hash Verification: - Calculate cryptographic hash (SHA256) at collection - Verify hash before each access/transfer - If hash changes → evidence compromised
Legal Implications: - Broken chain → evidence inadmissible in court - Gaps in documentation → defense can claim tampering - Proper chain → evidence integrity proven
Best Practices: - Store evidence in secured, access-controlled location - Use write-blockers when accessing storage media - Document everything in evidence log
Reference: Chapter 8, Section 8.6 - Chain of Custody
Question 7: What is the primary goal of a lessons learned meeting after an incident?
A) To assign blame to individuals B) To identify what worked, what didn't, and how to improve processes and detections C) To celebrate the incident D) Lessons learned meetings are not necessary
Answer
Correct Answer: B) To identify what worked, what didn't, and how to improve processes and detections
Explanation:
Lessons Learned Meeting: - Timing: Within 1-2 weeks post-incident (while details are fresh) - Attendees: IR team, SOC analysts, IT, management, relevant stakeholders - Duration: 60-90 minutes - Tone: Blameless, focus on process improvement
Meeting Agenda:
1. Incident Summary (5 min): - What happened? - Timeline overview - Impact assessment
2. What Went Well (15 min): - Effective detections - Good communication - Successful containment actions - Example: "EDR detected malware within 5 minutes of execution"
3. What Didn't Go Well (20 min): - Detection gaps - Communication failures - Process bottlenecks - Example: "Lacked runbook for this attack type, wasted 30 min researching response"
4. Root Cause Analysis (15 min): - How did attacker gain access? - Why did initial defenses fail? - What enabled lateral movement?
5. Action Items (20 min): - Create/update detection rules - Patch vulnerabilities - Update runbooks - Train staff - Assign owners and deadlines
6. Metrics & Reporting (10 min): - MTTD, MTTA, MTTR - Lessons for executive report
Example Action Items:
1. Create detection rule for T1003.001 (LSASS dumping) - Owner: Detection Engineer - Due: 2 weeks
2. Update phishing response runbook with new procedures - Owner: SOC Manager - Due: 1 week
3. Deploy MFA on admin accounts (prevented by this attack) - Owner: IT - Due: 1 month
4. Conduct tabletop exercise for ransomware - Owner: IR Lead - Due: 3 months
NOT a Blame Session: Focus on systemic improvements, not individual mistakes
Reference: Chapter 8, Section 8.7 - Lessons Learned
Question 8: What is the difference between a post-mortem and a lessons learned meeting?
A) They are identical B) Post-mortem focuses on technical root cause and timeline, lessons learned focuses on process improvements and actionable takeaways C) Post-mortems are only for fatal incidents D) Lessons learned meetings are for executives only
Answer
Correct Answer: B) Post-mortem focuses on technical root cause, lessons learned focuses on process improvements
Explanation:
Post-Mortem (Technical Deep-Dive): - Focus: Detailed technical analysis - Audience: IR team, security engineers, detection engineers - Content: - Complete attack timeline - Technical TTPs used - Root cause analysis (5 Whys) - Evidence artifacts - Forensic findings
Example Post-Mortem Content:
Incident: Ransomware via phishing
Timeline:
14:05 - User clicks phishing link
14:06 - Malware downloads (SHA256: abc123...)
14:07 - Persistence via scheduled task
14:10 - Credential dumping (T1003.001)
14:25 - Lateral movement to file server
14:30 - Ransomware encryption begins
Root Cause:
1. Email gateway lacked attachment sandboxing
2. User training insufficient (clicked obvious phishing)
3. No MFA on admin accounts (credential theft succeeded)
4. Delayed EDR alert (5 min MTTD too slow)
Lessons Learned (Process Improvement): - Focus: Organizational improvements - Audience: Broader (includes management, IT, business stakeholders) - Content: - What worked well - What didn't work - Action items for improvement - Policy/process updates
Example Lessons Learned Content:
Wins:
- EDR detected malware (though slightly delayed)
- Team contained spread within 30 minutes
Improvements Needed:
- Email sandboxing deployment
- MFA on all admin accounts
- Quarterly phishing simulations
- Update runbook with lessons
Action Items:
- Deploy sandboxing (IT, 2 weeks)
- Enable MFA (IT, 1 month)
- Conduct phishing training (HR, quarterly)
Relationship: Post-mortem informs lessons learned, lessons learned drives action
Reference: Chapter 8, Section 8.8 - Post-Mortem vs Lessons Learned
Question 9: What is a tabletop exercise in the context of incident response?
A) A physical test of network equipment B) A simulated incident scenario discussed by the IR team to practice decision-making without live system impact C) A penetration test D) A type of malware
Answer
Correct Answer: B) A simulated incident scenario discussed by the IR team to practice decision-making without live system impact
Explanation:
Tabletop Exercise (TTX): - Format: Discussion-based simulation (no live systems affected) - Participants: IR team, SOC, IT, management, legal, PR - Duration: 2-4 hours - Facilitator: IR lead or external consultant - Goal: Test response plans, identify gaps, build muscle memory
TTX Structure:
1. Scenario Introduction (10 min):
"At 3:00 AM, your EDR alerts on WKS-042: 'Ransomware detected'.
The alert shows encryption activity on a file server.
What do you do?"
2. Facilitated Discussion (90-120 min): - Facilitator: "Who is the first responder?" - SOC Analyst: "Tier 1 analyst on duty" - Facilitator: "What's your first action?" - Analyst: "Isolate WKS-042 from network" - Facilitator: "Good. Who do you notify?" - Analyst: "Tier 2 IR lead and manager" - Facilitator: "IR lead, you're now involved. What do you investigate?" - IR Lead: "Check for lateral movement, identify patient zero..."
3. Inject New Information:
Facilitator: "30 minutes later, you discover 5 more systems encrypted.
The file server backup is also encrypted. What now?"
4. Decision Points: - When to involve law enforcement? - When to notify customers? - Pay ransom or restore from backups? - How to communicate with executives?
5. Debrief (30 min): - What went well? - What gaps were identified? - Action items
Example Scenarios: - Ransomware outbreak - Data breach (PII exfiltration) - Insider threat - Supply chain compromise - DDoS attack
Benefits: - Low risk (no production impact) - Builds team coordination - Identifies runbook gaps - Practice decision-making under pressure
Reference: Chapter 8, Section 8.9 - Tabletop Exercises
Question 10: During incident response, when should law enforcement be contacted?
A) For every security alert B) When legally required (data breach laws) or when incident involves criminal activity requiring investigation/prosecution C) Never contact law enforcement D) Only after the incident is fully resolved
Answer
Correct Answer: B) When legally required or when incident involves criminal activity requiring investigation
Explanation:
When to Involve Law Enforcement:
1. Legal Requirements: - Data Breach Notification Laws: GDPR, CCPA, state laws may mandate law enforcement notification - Regulated Industries: HIPAA (healthcare), PCI-DSS (payment cards), banking regulations - Example: Breach of 10,000+ customer records → mandatory FBI notification
2. Criminal Activity: - Extortion (ransomware demands) - Financial fraud (wire transfer fraud) - Nation-state attacks (critical infrastructure) - Child exploitation material - Insider threats requiring prosecution
3. Need for Legal Authority: - Attacker infrastructure in foreign jurisdiction (need international cooperation) - Need subpoena power to obtain ISP records - Pursuing criminal charges
Considerations Before Contacting Law Enforcement:
Pros: - Access to threat intelligence - Subpoena power - Criminal prosecution - Decryption keys (FBI may have ransomware decryptors)
Cons: - Investigation may become evidence (loss of control) - Potential public disclosure - Extended timeline (criminal investigations take months/years) - May delay recovery
Decision Framework:
IF (legal requirement OR need prosecution OR need decryption assistance):
Contact law enforcement
ELSE IF (prefer private handling AND no legal mandate):
Handle internally, consult legal counsel
Who to Contact: - US: FBI Cyber Division, Secret Service (financial crimes), local field office - EU: National cybercrime units, Europol - Industry ISACs: Financial Services ISAC, Health ISAC
Reference: Chapter 8, Section 8.10 - Law Enforcement Coordination
Question 11: What is the purpose of preserving forensic evidence in a write-protected state?
A) To make the evidence read-only and prevent any modifications that could compromise integrity B) To encrypt the evidence C) To delete the evidence D) Write protection is not necessary
Answer
Correct Answer: A) To make evidence read-only and prevent modifications that could compromise integrity
Explanation:
Write Protection for Forensics: - Purpose: Ensure evidence is not altered during analysis - Mechanism: Hardware or software write-blockers - Legal Requirement: Maintains evidence integrity for court admissibility
Write-Blocker Tools:
1. Hardware Write-Blockers: - Physical device between storage media and forensic workstation - Prevents any write operations to evidence drive - Examples: Tableau, CRU WiebeTech
2. Software Write-Blockers: - OS-level protection - Examples: Windows Registry tweaks, Linux mounting as read-only
Forensic Imaging Process:
Step 1: Attach suspect drive to hardware write-blocker
Step 2: Connect write-blocker to forensic workstation
Step 3: Create bit-for-bit image (dd, FTK Imager, EnCase)
Step 4: Calculate hash of source drive
Step 5: Calculate hash of image file
Step 6: Verify hashes match (proves integrity)
Step 7: Analyze IMAGE, not original drive
Step 8: Store original drive in evidence locker (never access again)
Why This Matters:
Scenario Without Write Protection:
Analyst mounts suspect drive to analyze
↓
Operating system automatically updates "last accessed" timestamps
↓
Evidence is now modified (metadata changed)
↓
Defense attorney: "Evidence has been tampered with!"
↓
Evidence inadmissible in court
Scenario With Write Protection:
Analyst mounts drive via write-blocker
↓
All read operations succeed
↓
OS attempts to update timestamps → BLOCKED
↓
Evidence remains unchanged
↓
Hash verification proves integrity
↓
Evidence admissible in court
Best Practice: NEVER analyze original evidence, always work on verified forensic copy
Reference: Chapter 8, Section 8.5 - Write Protection
Question 12: What is the 'Golden Hour' in incident response?
A) The hour before lunch B) The first 60 minutes after detection when rapid response can significantly limit damage C) The hour when most attacks occur D) A golden retriever therapy session for stressed analysts
Answer
Correct Answer: B) The first 60 minutes after detection when rapid response can significantly limit damage
Explanation:
Golden Hour Concept: - Origin: Borrowed from emergency medicine (critical first hour after trauma) - In IR: First 60 minutes after incident detection - Importance: Actions taken in this window drastically impact outcome
Why the Golden Hour Matters:
Ransomware Example:
00:00 - Ransomware detected on 1 system
00:05 - Analyst triages alert
00:10 - Isolates infected system
00:15 - Searches for lateral movement
00:20 - Finds attacker on file server (pre-encryption)
00:25 - Isolates file server
00:30 - Eradicates attacker presence
Result: 2 systems affected, no data loss
VS.
00:00 - Ransomware detected
02:00 - Analyst finally responds (delayed 2 hours)
02:15 - Begins investigation
02:30 - Discovers 50 systems encrypted
Result: 50 systems affected, 2TB data encrypted, $500K recovery cost
Golden Hour Actions:
1. Immediate Triage (0-5 min): - Validate alert is true positive - Assess severity
2. Rapid Containment (5-15 min): - Isolate affected systems - Disable compromised accounts - Block malicious IPs/domains
3. Scope Assessment (15-30 min): - Identify lateral movement - Find patient zero - Map affected assets
4. Escalation & Communication (30-45 min): - Notify IR lead - Brief management - Engage legal/PR if needed
5. Evidence Collection (45-60 min): - Capture memory dumps - Collect volatile evidence - Document timeline
Metrics: - Goal: Containment within Golden Hour - Measurement: Time from detection to containment - Industry Average: ~60 minutes for mature SOCs
Reference: Chapter 8, Section 8.11 - The Golden Hour
Question 13: What should be included in an incident response playbook/runbook?
A) Only the incident commander's name B) Step-by-step procedures, decision trees, contact information, evidence collection steps, and escalation criteria C) Random notes D) Playbooks are not necessary
Answer
Correct Answer: B) Step-by-step procedures, decision trees, contact info, evidence collection, escalation criteria
Explanation:
Incident Response Runbook Components:
1. Incident Identification: - Alert name and SIEM query - Symptoms and indicators - ATT&CK mapping
2. Initial Response (Golden Hour Actions):
Step 1: Validate alert (true/false positive)
Step 2: Assess severity (Low/Medium/High/Critical)
Step 3: If High/Critical → Notify IR lead immediately
Step 4: Document start time and initial findings
3. Triage & Investigation:
- Check for lateral movement
- Identify compromised accounts
- Query threat intelligence
- Determine scope (how many systems affected?)
4. Containment Actions:
Decision Tree:
IF ransomware detected:
→ Isolate infected hosts immediately
→ Disable compromised user accounts
→ Block C2 domains/IPs at firewall
IF data exfiltration:
→ Block destination IPs
→ Snapshot affected databases
→ Preserve evidence
5. Evidence Collection:
- Memory dump: Use FTK Imager
- Disk image: Use dd or EnCase
- Network capture: tcpdump/Wireshark
- Log export: SIEM query [provide template]
- Calculate SHA256 hash for chain of custody
6. Escalation Criteria:
Escalate to IR Lead if:
- Severity: High or Critical
- Scope: > 5 systems affected
- Asset: Critical infrastructure (domain controller, database)
- User: Executive/VIP account
- Uncertainty: Analyst unsure of next steps
7. Contact Information:
- IR Lead: Jane Doe - jane@company.com - 555-0100
- Manager: John Smith - john@company.com - 555-0101
- Legal: legal@company.com - 555-0102
- PR: pr@company.com - 555-0103
- Law Enforcement: FBI Cyber - cyber@fbi.gov - 1-800-CALL-FBI
8. Recovery Steps:
- Eradication checklist
- System rebuild procedures
- Validation testing
- Return to production criteria
9. Lessons Learned Template:
Best Practices: - Keep runbooks updated (review quarterly) - Use checklists for consistency - Include screenshots/examples - Version control (track changes)
Reference: Chapter 8, Section 8.12 - Runbook Design
??? question "Question 14: What is the primary risk of not conducting post-incident activities (lessons learned)?
**A)** Analysts feel sad
**B)** Repeating the same mistakes, missing opportunities to improve detections and processes
**C)** Post-incident activities waste time
**D)** No risks, they are optional
??? success "Answer"
**Correct Answer: B) Repeating the same mistakes, missing opportunities to improve**
**Explanation:**
**Importance of Post-Incident Activities:**
**Risk of Skipping Lessons Learned:**
- **Repeated Incidents:** Same attack succeeds again due to unpatched gaps
- **Missed Detection Improvements:** Gaps remain unclosed
- **Morale Impact:** Team feels their efforts don't lead to improvement
- **Compliance Failures:** Regulations may require post-incident reviews
**Real-World Example:**
**Scenario 1: No Lessons Learned**
```
Month 1: Phishing attack succeeds → Incident resolved → No post-incident review
Month 3: Same phishing technique succeeds again → Different user, same vulnerability
Month 6: Third phishing incident → Pattern not recognized, no systemic fix
Impact: 3 incidents, ongoing risk, low team morale
```
**Scenario 2: With Lessons Learned**
```
Month 1: Phishing attack succeeds
↓
Lessons Learned Meeting:
- Gap: Email gateway lacks attachment sandboxing
- Action: Deploy sandboxing (completed Month 2)
- Gap: User training inadequate
- Action: Quarterly phishing simulations (started Month 2)
- Gap: Detection rule didn't catch suspicious email
- Action: Create new rule for sender spoofing (deployed Month 1)
↓
Month 3: Phishing attempt blocked by sandboxing
Month 6: User reports phishing (trained via simulation)
Impact: 1 incident, systemic improvements, improved security posture
```
**Continuous Improvement Cycle:**
```
Incident → Response → Lessons Learned → Action Items → Improved Detections/Processes → Better Prevention → Fewer Incidents
```
**What Gets Documented:**
1. **Technical Gaps:** Missing detections, unpatched vulnerabilities
2. **Process Gaps:** Unclear runbooks, communication failures
3. **Tooling Gaps:** Lack of EDR, SIEM coverage gaps
4. **Training Gaps:** User awareness, analyst skills
**Compliance Considerations:**
- PCI-DSS requires incident documentation
- GDPR requires breach post-mortems
- SOC 2 audits review incident learnings
**Reference:** [Chapter 8, Section 8.7 - Importance of Lessons Learned](../chapters/ch08-soar-automation-playbooks.md)
Question 15: In a large-scale incident affecting multiple systems, what is the role of an Incident Commander?
A) To personally fix all technical issues B) To coordinate response efforts, make strategic decisions, communicate with stakeholders, and ensure resources are allocated effectively C) To blame team members D) Incident commanders are not needed
Answer
Correct Answer: B) To coordinate response, make strategic decisions, communicate with stakeholders, allocate resources
Explanation:
Incident Commander (IC) Role: - Authority: Central decision-maker during major incidents - Focus: Strategic coordination, not tactical execution - Duration: Active until incident is contained/resolved
IC Responsibilities:
1. Coordination: - Assemble IR team (analysts, IT, forensics, legal, PR) - Assign roles and responsibilities - Ensure teams don't duplicate efforts
2. Strategic Decision-Making: - Approve high-impact containment (isolate production systems?) - Decide when to involve law enforcement - Determine communication strategy - Prioritize response actions
3. Communication: - Upward: Brief executives, board - Lateral: Coordinate with IT, legal, PR - Downward: Direct IR team - External: Law enforcement, customers (if needed)
4. Resource Allocation: - Deploy additional analysts if needed - Authorize overtime/on-call - Engage third-party forensics if needed - Budget approvals for emergency tools/services
5. Documentation Oversight: - Ensure proper evidence handling - Review incident timeline - Approve post-incident report
Example: Ransomware Incident
Without IC (Chaotic):
- IT starts rebuilding servers
- SOC isolates systems
- Legal wants to preserve evidence
- PR drafts customer notification
Result: IT rebuilds destroy forensic evidence, SOC isolation disrupts recovery, conflicting actions
With IC (Coordinated):
IC: "Before any rebuilding, forensics team captures disk images"
IC: "SOC, identify all affected systems - don't isolate yet"
IC: "IT, prepare rebuild plan but wait for evidence collection"
IC: "Legal, draft notification but don't send until scope confirmed"
IC: "Forensics, you have 4 hours to collect evidence, then IT can rebuild"
Result: Evidence preserved, coordinated recovery, no conflicting actions
IC Decision Framework: - Technical Decisions: Delegated to experts (SOC lead, IT lead) - Strategic Decisions: IC makes final call (isolate production? notify customers?) - Escalation: IC decides when to escalate to CEO/board
Skills Required: - Calm under pressure - Clear communication - Technical understanding (doesn't need to be deepest expert) - Leadership experience
Reference: Chapter 8, Section 8.13 - Incident Commander Role
Score Interpretation¶
- 13-15 correct: Excellent! You understand the IR lifecycle, forensics, and post-incident processes.
- 10-12 correct: Good foundation. Review containment strategies and evidence handling.
- 7-9 correct: Adequate understanding. Focus on NIST phases and lessons learned importance.
- Below 7: Review Chapter 8 thoroughly, especially the IR lifecycle and forensic best practices.