Order of Volatility and Acquisition Choices

Key Takeaways

  • Order of volatility prioritizes evidence that disappears fastest, such as CPU state, memory, network state, and running processes.
  • Acquisition choices depend on incident goals, system state, legal requirements, business impact, and evidence volatility.
  • Live acquisition can preserve volatile evidence but may change the system.
  • Dead-box acquisition can reduce system changes but loses volatile state.
  • Responders should document acquisition methods, tools, timestamps, hashes, and limitations.
Last updated: April 2026

Order of Volatility and Acquisition Choices

Order of volatility means collecting the most temporary evidence first. Some evidence disappears as soon as a system is powered off. Other evidence may remain for months. The investigator should prioritize what is most likely to vanish while still considering safety, authorization, and business impact.

Volatility Examples

More volatileLess volatile
CPU registers and cacheBackups and archived logs
Running processesDisk files
RAM contentsInstalled applications
Active network connectionsPrinted documentation
Temporary filesLong-term storage
Routing and ARP tablesOffline disk images

Security+ questions may not require deep tool knowledge. They often test whether you understand that memory, running processes, and active network connections should be captured before powering off or reimaging a system.

Acquisition Choices

ChoiceWhen usefulRisk or limitation
Memory captureMalware may be fileless, keys may be in RAM, process state mattersRunning a tool changes the system
Live response commandsNeed active network connections, logged-in users, running processesCommands can alter timestamps or state
Disk imageNeed deleted files, persistence, file metadata, offline analysisMay miss activity that existed only in memory
Log exportNeed identity, network, cloud, or application timelineLogs may be incomplete or normalized differently
Packet captureNeed traffic content or protocol detailsEncrypted traffic may limit visibility
SnapshotCloud or virtual systems need quick preservationSnapshot consistency depends on platform and timing

PBQ-Style Scenario

A server is still powered on. EDR reports a suspicious process, and firewall logs show active outbound connections. Legal has approved evidence collection. The system is not safety critical.

Reasonable order:

1. Photograph or record visible state and basic system details.
2. Capture volatile data such as memory, running processes, logged-in users, and network connections.
3. Export relevant logs from endpoint, identity, firewall, and application sources.
4. Acquire a forensic disk image or platform snapshot.
5. Hash and secure collected evidence.
6. Analyze verified copies.

If the same server controlled life safety or industrial equipment, the decision could change. Safety and operational risk may override ideal evidence order. That is why incident response involves business and technical owners.

Live Versus Dead-Box

Live acquisition collects evidence from a running system. It is useful for volatile state but can change the system. Dead-box acquisition powers down or removes media for imaging. It can protect disk evidence but loses memory and active network details.

The right choice depends on what question must be answered. If the investigation needs encryption keys, injected processes, or active connections, live capture may be important. If the system is already powered off, do not power it on casually just to look around. That may change evidence.

Common Traps

  • Pulling the plug before considering memory and active connections.
  • Running many unapproved tools on the original system without documentation.
  • Capturing a disk image but forgetting cloud logs where the activity occurred.
  • Failing to record tool versions and timestamps.
  • Assuming acquisition is perfect and not documenting limitations.
  • Powering on a seized laptop without a forensic plan.
Test Your KnowledgeOrdering

PBQ style: A running workstation is suspected of fileless malware. Place evidence collection steps in a defensible order.

Arrange the items in the correct order

1
Acquire a forensic disk image
2
Capture memory and active process or network state
3
Analyze verified copies
4
Document visible state and system details
5
Hash and secure collected evidence
Test Your Knowledge

Why might an investigator perform live acquisition?

A
B
C
D
Test Your Knowledge

A laptop is already powered off and is needed for a formal investigation. What is the safest general approach?

A
B
C
D