Domain 7 · Lesson 1 of 6
Incident Response Lifecycle (NIST 800-61)
Quy trình Ứng phó Sự cố
NIST SP 800-61 Rev 2 — 6 Phases
Critical Order: Containment BEFORE Eradication
You must stop the damage (contain) before you can clean it up (eradicate). Acting out of order risks further spread.
| Phase | Tiếng Việt | Key Activities |
|---|---|---|
| 1Preparation | Chuẩn bị | IR plan, team (CIRT/CSIRT), runbooks, communication plan, tools ready, tabletop exercises |
| 2Detection & Analysis | Phát hiện & Phân tích | Alert triage, log correlation, severity classification (P1–P4), scope determination |
| 3Containment | Ngăn chặn | Short-term: isolate/block — stop the bleeding. Long-term: patch/harden for extended operation while investigation continues |
| 4Eradication | Loại bỏ | Remove malware, close vulnerabilities, reset compromised credentials, check for persistence mechanisms |
| 5Recovery | Phục hồi | Restore from clean backup, validate integrity, monitor closely, gradual return to production |
| 6Post-Incident Activity | Bài học kinh nghiệm | Root cause analysis, lessons learned report, update IR plan, implement improvements |
Incident Severity Levels
| Level | Description | Response Time |
|---|---|---|
| P1 Critical | Service down, data breach in progress | Immediate (24/7) |
| P2 High | Degraded service, security control bypassed | Within 1 hour |
| P3 Medium | Minor impact, potential threat | Within 4 hours |
| P4 Low | Informational, no immediate impact | Next business day |
P1 vs P2 Distinction
P1 = service is DOWN or breach is ACTIVE — existential risk. P2 = service is degraded or a security control has been bypassed but the situation is still containable without 24/7 mobilization.
Breach Notification Requirements
Timer starts from AWARENESS — not discovery
When your organization knew or should have known about the breach. "We found out last week but didn't report" is not a valid defense.
| Regulation | Notification Window | Notify Who |
|---|---|---|
| GDPR (EU) | 72 hours | Supervisory authority (DPA); individuals if high risk |
| Philippines DPA | 72 hours | National Privacy Commission (NPC) |
| PCI-DSS | Immediately | Notify card brands (Visa, Mastercard) and acquiring bank |
| Vietnam | As soon as possible | Relevant government authority (Ministry of Public Security / VNISA) |
IR Team Composition & Key Terms
CIRT / CSIRT Roles
- Security: technical investigation lead
- Legal: regulatory obligations, evidence handling
- HR: insider threat, employee actions
- PR/Communications: external messaging
- Executive sponsor: business decisions (shutdown?)
Runbook vs Playbook
- Runbook: detailed step-by-step technical procedure for a specific scenario (e.g., "PII breach in Platform C — exact commands to run")
- Playbook: higher-level response flow and decision trees — the strategic guide
- Runbooks live inside playbooks as technical annexes
Key Terms
- Phase order: Preparation → Detection → Containment → Eradication → Recovery → Lessons Learned. CONTAINMENT before ERADICATION — always.
- "First step after discovering a breach" → CONTAIN (not eradicate, not notify, not fully investigate)
- Breach notification timer starts from AWARENESS (when organization knew or should have known)
- Runbooks = detailed technical steps for a specific scenario; Playbooks = higher-level response flows
- IR team must include: security, legal, HR, PR/communications, executive sponsor — not just the security team
- Lessons Learned phase is REQUIRED for a complete IR process — it drives continuous improvement
1. Preparation: Did an IR plan exist before the incident? Was there a runbook for PII exposure? Gap: if not, create one now for top 5 Platform C incident types.
2. Detection: How was unencrypted PII discovered — a Datadog monitoring alert, an InfoSec audit, or a customer report? The detection method determines MTTD.
3. Containment: Production shutdown — this is correct. Short-term containment: stop the bleeding by halting the service. Platform C processes no new PII during investigation.
4. Eradication: Implement AES-256-CTR encryption for all PII fields in Platform C. Audit all Platform A tables for any other unencrypted PII. Patch the root cause (missing encryption-at-rest enforcement).
5. Recovery: InfoSec sign-off before redeployment — this is a formal validation gate. Correct practice. Gradual rollout with close monitoring in Datadog.
6. Lessons Learned: Was a post-incident report written? Was "encryption by default" added to Platform C architecture standards? Were Vault policies updated to prevent unencrypted storage?
Action: Create runbooks for top 5 Platform C incident types: PII breach, Kafka outage, eKYC service down, bank H2H failure, DDoS on public API.
Practice Quiz
Q1. Which IR phase comes immediately after detecting a breach — Containment or Eradication?
▼ Reveal Answer
Q2. The production shutdown in the FinTech Company X PII incident — which IR phase does this represent?
▼ Reveal Answer
Q3. What is the GDPR breach notification timeline, and when does the clock start?
▼ Reveal Answer
Q4. What distinguishes a P1 Critical from a P2 High incident?
▼ Reveal Answer
Q5. Is the Lessons Learned / Post-Incident Activity phase required, or optional?