Defensive
Examples:
0xfh (pick the right tags)
malware-analysis-writeups - GitHub
Guides on writing incident response reports: Hack the Box.
Computer Security Incident Handling Forms (examples) :
This form is used during the eradication phase of an incident to document steps taken to eliminate malicious activity or security threats from affected systems.
This form is used during the containment phase which focuses on preventing further spread of the incident or attack. This form guides security teams in documenting containment actions.
The contact list form is vital for incident management, ensuring all stakeholders are informed and can coordinate efforts during a security incident.
This guide by NIST (SP 800-84) provides a comprehensive guide to creating, testing, and refining IT incident response plans through exercises and training programs.
This sample evidence chain of custody form by NIST is essential for maintaining the integrity of evidence during an investigation. It tracks the handling, transfer, and storage of digital evidence during security incidents.
The incident response plan outlines the organization's procedures and workflows for incident detection, response, and recovery. This can act as a guide for organizing the entire incident response process.
Other types of documents, concepts or terms you need to get familiar with: Incident Timeline , Post-Incident Report, Forensic Investigation Checklist, Digital Forensics Procedures, Risk Assessment Forms, Communication Plan, Security Operations Center (SOC) Playbook, Incident Severity Classification Guide...
Last updated