IR Phases and Roles

Key Takeaways

  • Incident response uses a repeatable lifecycle so teams can prepare, detect, contain, eradicate, recover, and improve.
  • Preparation includes playbooks, contact lists, logging, tooling, access, training, and evidence procedures.
  • Roles should be clear before an incident, including incident commander, technical leads, communications, legal, HR, and business owners.
  • Triage separates events from incidents by evaluating scope, impact, confidence, and urgency.
  • A timeline helps responders coordinate actions and preserve what happened.
Last updated: April 2026

IR Phases and Roles

Incident response is the organized process for handling events that may affect confidentiality, integrity, or availability. The goal is not just to remove malware or close an alert. The goal is to limit harm, preserve evidence, restore trusted operations, communicate correctly, and improve the environment after the incident.

Security+ uses the incident response lifecycle as a practical framework. Different organizations may name the phases slightly differently, but the core work is consistent: prepare, detect and analyze, contain, eradicate, recover, and conduct post-incident activity.

Incident Response Lifecycle

PhasePurposeExample actions
PreparationMake response possible before an incident occursCreate playbooks, train staff, verify contacts, deploy logging, define severity levels
Detection and analysisDetermine what happened and whether it is an incidentReview alerts, validate indicators, scope affected users and systems, open an incident record
ContainmentLimit spread and reduce active harmIsolate hosts, disable accounts, block indicators, segment affected systems
EradicationRemove the cause of compromiseRemove malware, close exploited vulnerability, rotate exposed secrets, remove persistence
RecoveryRestore trusted serviceRebuild systems, monitor closely, validate business function, return services in phases
Lessons learnedImprove future responseReview timeline, document gaps, update controls, measure response performance

Event, Alert, and Incident

An event is any observable activity, such as a login, file write, or firewall connection. An alert is a notification that something may require attention. An incident is a confirmed or strongly suspected violation of policy or security that requires a coordinated response.

Example:

08:12 alert: EDR reports encoded PowerShell on LAP-118
08:18 event review: Word spawned PowerShell after opening invoice.docm
08:26 additional evidence: DNS query to newly registered domain
08:33 incident declared: suspected phishing payload with command and control traffic

The declaration matters. Once the team treats the activity as an incident, it should use an incident record, assign roles, preserve evidence, and track decisions.

Common Roles

RoleResponsibility
Incident commanderCoordinates response, owns priorities, tracks decisions
Security analystReviews alerts, gathers evidence, builds timeline
Forensic analystPreserves and analyzes evidence when investigation depth is needed
System ownerExplains business function and approves operational changes
Network or endpoint engineerImplements containment and recovery actions
Communications leadCoordinates internal and external messaging
Legal or privacy counselAdvises on evidence, privilege, notification, and regulatory issues
Executive sponsorMakes high-impact business risk decisions

Scenario Timeline

A school district receives several reports that staff cannot open shared lesson files. The help desk sees filenames ending in an unfamiliar extension. Security opens an incident record.

TimeActionOwnerNotes
09:05Help desk reports file access issueHelp desk leadMultiple users affected
09:11EDR alert found on FS-04Security analystSuspicious process renamed files
09:16Incident declaredIncident commanderSeverity high due to shared file server
09:22SMB access limited to affected shareNetwork engineerContainment while preserving host state
09:34Service account disabledIAM engineerAccount used by suspicious process
10:20Snapshot and volatile data capturedForensic analystEvidence preserved before rebuild decisions

Common Traps

  • Starting eradication before preserving key evidence.
  • Having no incident commander, causing multiple teams to take conflicting actions.
  • Treating every alert as an incident without triage.
  • Waiting for perfect certainty while active damage continues.
  • Letting business owners make technical evidence decisions without security input.
  • Letting security teams isolate critical systems without consulting operational owners when safety or availability is affected.

Exam Focus

For SY0-701, watch for words such as playbook, escalation, containment, eradication, recovery, lessons learned, and incident commander. The best answer usually follows the incident phase implied by the scenario. If the scenario says the attacker is still active, containment is often the priority. If systems are clean and business service is being returned, recovery and validation become the focus.

Test Your KnowledgeOrdering

PBQ style: Place these incident response phases in the most appropriate order.

Arrange the items in the correct order

1
Recover affected services and validate normal operations
2
Prepare playbooks, tools, training, and contacts
3
Contain affected systems or accounts
4
Detect, validate, and analyze suspicious activity
5
Eradicate malware, persistence, or exploited weaknesses
6
Conduct lessons learned and update controls
Test Your Knowledge

During a high-severity incident, who should coordinate priorities, decisions, and cross-team response actions?

A
B
C
D
Test Your KnowledgeMulti-Select

Which preparation items make incident response more effective? Select three.

Select all that apply

Current contact lists
Tested playbooks
Centralized logging and access to tools
A policy to delete all logs after one hour
A rule that legal is never contacted