Incident Response for the CISSP exam β NIST 800-61 phases, order of volatility, chain of custody, forensic imaging, CSIRT roles, and 10 scenario questions modeled on real exam items.
π§ͺ Take the 10-Question Quiz βCISSP tests your ability to sequence IR phases correctly, identify the right action at each phase, handle evidence properly, and understand CSIRT roles.
Lessons learned from Post-Incident Activity feed back into Preparation β strengthening policies, tools, and training before the next incident. The cycle never truly ends.
Select a topic to explore phase details, evidence handling, and forensic principles.
Preparation is the most important phase β everything that determines how well an organization responds to an incident is built here. Poor preparation means slow, chaotic, and legally risky incident response.
The goal of this phase is to determine: Is this actually an incident? What type? How severe? How far has it spread? This analysis drives all subsequent response decisions.
These three sub-phases must happen in strict order. Skipping Containment to jump to Eradication is one of the most dangerous mistakes in incident response.
Evidence must be collected in order from most volatile (data that disappears first when power is lost) to least volatile. Reversing this order destroys irreplaceable evidence.
A legal hold (also called a litigation hold) is a directive to suspend normal data destruction processes β including log rotation, backup overwriting, and scheduled deletions β when litigation or a regulatory investigation is reasonably anticipated.
All four NIST 800-61 phases across every CISSP-relevant dimension.
| Criteria | π΄ Preparation | π΅ Detection & Analysis | π’ Contain / Eradicate / Recover | π£ Post-Incident |
|---|---|---|---|---|
| TimingPhase Basics | Before any incident β ongoing | During active incident β discovery phase | During active incident β response phase | After incident is closed |
| Primary GoalPhase Basics | Build IR capability before incidents occur | Confirm, scope, and classify the incident | Stop spread, remove threat, restore operations | Learn, improve, report, and update defenses |
| Key DeliverablePhase Basics | IR policy, CSIRT roster, jump kit, trained team | Incident ticket, severity classification, scope map | Contained environment, clean systems, restored service | Lessons learned report, updated procedures |
| PDRR EquivalentPhase Basics | Protect | Detect | Respond | Recover (with lessons) |
| Key ActionsKey Actions | Form CSIRT, write IR policy, deploy SIEM/IDS, prepare jump kit, train team | Review SIEM alerts, correlate logs, triage IOCs, classify severity, declare incident | Isolate systems, preserve evidence (RAM/disk), remove malware, patch, restore backup | Lessons learned meeting, root cause analysis, update IR plan, regulatory notifications |
| Evidence HandlingKey Actions | Prepare forms, evidence bags, write blockers, forensic imaging tools | Begin incident timeline documentation; do not alter systems | Capture RAM first, disk image with write blocker, establish chain of custody | Evidence preserved per legal hold; documented for potential prosecution |
| Who LeadsKey Actions | CISO / Security Manager β strategic planning | Security Analyst β technical investigation | Incident Commander + IT Ops + Forensics | CISO + Legal + Compliance β reporting |
| CISSP Exam SignalsExam Signals | "CSIRT," "IR policy," "jump kit," "tabletop exercise," "training," "playbook," "before the incident" | "IOC," "SIEM alert," "triage," "classify severity," "false positive," "incident declaration," "scope" | "isolate," "contain," "preserve evidence," "root cause," "eradicate malware," "restore from backup," "patch" | "lessons learned," "post-mortem," "root cause report," "update procedures," "regulatory notification," "after the incident" |
| Common Exam TrapExam Signals | Skipping preparation β assuming IR can be improvised during an incident | Skipping to containment before confirming scope β may miss other compromised systems | Eradicating before containing β attacker can re-infect; evidence destroyed | Skipping lessons learned β NIST 800-61 requires it; not optional |
Six scenarios modeled directly on CISSP exam question formats.
netstat -an). (3) Disconnect from network (containment). (4) Image the disk with a write blocker. (5) Calculate hashes to verify integrity.a3f5b2c1.... After imaging, she calculates the MD5 hash of the forensic image: a3f5b2c1.... The hashes match.Scenario-based items modeled on real exam format. Each question maps to a specific IR phase or forensic concept.
Answer 3 questions to identify the correct NIST 800-61 phase and recommended next action.
Click each card to flip and reveal the mnemonic.
| If the question says⦠| Think⦠| Answer |
|---|---|---|
| "CSIRT," "IR policy," "jump kit," "tabletop," "before an incident," "playbook," "train the team" | π΄ Building the fire station | Preparation |
| "IOC," "SIEM alert," "triage," "false positive," "classify severity," "scope the incident," "declare" | π΅ Confirm, scope, classify | Detection & Analysis |
| "isolate system," "preserve evidence," "eradicate malware," "patch," "restore from backup," "reimage" | π’ Stop Β· Remove Β· Restore | Containment / Eradication / Recovery |
| "lessons learned," "root cause," "post-mortem," "update IR plan," "notify regulator," "after the incident" | π£ Learn, report, improve | Post-Incident Activity |
| "first action on live system," "what to collect first," "most volatile data" | RAM disappears on power-off | Capture RAM first (Order of Volatility) |
| "write blocker," "hash verification," "bit-for-bit copy," "admissible evidence" | Evidence integrity = matching hashes + write blocker | Chain of Custody / Forensic Imaging |
| "do not delete logs," "suspend log rotation," "preserve data for investigation" | Destroying evidence after litigation reasonably anticipated = spoliation | Legal Hold |
| "who handles media communications during incident" | PR/Communications officer β not the security analyst | Public Relations / Communications |
| "who authorizes taking the entire network offline" | Major business decision = needs executive authority | Senior Management |
| "GDPR breach notification timeline" | 72 hours to supervisory authority | 72 hours (GDPR Art. 33) |
| "HIPAA breach notification timeline" | 60 days to HHS (500+ individuals) | 60 days to HHS / 60 days to individuals |