Introduction

When a security incident hits, stress levels spike and clear thinking becomes a luxury. The difference between a controlled response and a chaotic scramble often comes down to one thing: preparation. A well-maintained checklist won't replace expertise, but it will ensure critical steps aren't missed when the pressure is highest.

This checklist follows the incident response lifecycle defined in NIST SP 800-61 Rev. 2 (Computer Security Incident Handling Guide), adapted with lessons learned from real-world engagements across industries. It covers five phases: Preparation, Detection & Analysis, Containment, Eradication & Recovery, and Post-Incident Activity.

Print it. Pin it to the wall in your SOC. Customize it for your environment. The goal isn't to follow it blindly — it's to ensure nothing falls through the cracks when every minute counts.

77% of organizations lack a consistently applied incident response plan, according to industry surveys. Having a documented, rehearsed plan is your single biggest advantage.

Phase 1: Preparation

Preparation is the phase you invest in before anything goes wrong. Every hour spent here pays dividends when an incident occurs. The goal is to ensure your people, processes, and technology are ready to detect, respond to, and recover from security incidents.

Phase 2: Detection & Analysis

Detection is where the incident response process truly begins. The quality of your initial analysis directly shapes every decision that follows. Move quickly, but don't sacrifice accuracy — a misidentified incident type can send your team down the wrong path entirely.

Phase 3: Containment

Containment is about stopping the bleeding without destroying evidence or tipping off an adversary who's still watching. There are two sub-phases: short-term containment (stop the immediate damage) and long-term containment (maintain a stable state while you prepare for eradication). The balance between speed and caution depends on whether the attacker is still active.

Short-Term Containment

Long-Term Containment

Phase 4: Eradication & Recovery

Eradication removes the threat from your environment. Recovery restores normal operations. Both must be done thoroughly — a rushed eradication invites re-compromise, and a rushed recovery reintroduces risk. Patience here is not a luxury; it's a discipline.

Phase 5: Post-Incident Activity

The post-incident phase is where good teams become great teams. Every incident is a learning opportunity, but only if you capture and act on the lessons. This phase is not optional — it's where you build the institutional memory that makes the next response faster and more effective.

A note on documentation

Throughout every phase, maintain a detailed, timestamped incident log. Record every action taken, every decision made (and the reasoning behind it), every finding, and every communication. This log serves multiple purposes: it enables handoffs between shifts, supports the post-incident review, satisfies regulatory requirements, and provides evidence if legal proceedings follow. If it isn't documented, it didn't happen.

Adapting This Checklist

This checklist is a starting point, not a finished product. Every organization has unique infrastructure, regulatory obligations, risk tolerance, and team structures. Take this framework and tailor it:

Need expert incident response support?

ForgeWork provides incident response services across Europe, from emergency response to IR program development. Our DFIR Assist platform helps teams manage forensic investigations, and our IR TTX Training program builds the muscle memory your team needs before the next incident.