Skip to main content

Incident Handler's Handbook

One of the greatest challenges facing today's IT professionals is planning and preparing for the unexpected, especially in response to a security incident. An incident is described as any violation of policy, law, or unacceptable act that involves information assets, such as computers, networks, smartphones, etc (Bejtlich, 2005). The scope of this document is limited to the six phases of the incident handling process and providing the basic information necessary as to what each step entails. Its overall purpose is to provide the basic foundation for IT professionals and managers to be able to create their own incident response policies standards and teams within their organizations. This document will also include an incident handler's checklist (template) that one can use to ensure that each of the incident response steps is being followed during an incident.

33901 (PDF, 1.97MB)

21 Feb 2012
ByPatrick Kral
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

SANS 2025 CTI Survey Webcast & Forum: Navigating Uncertainty in Today’s Threat Landscape

Research Paper

This paper explores results from the SANS 2025 CTI Survey, with insights into how cybersecurity...

  • 20 May 2025
  • Rebekah Brown, Andreas Sfakianakis

Beneath the Mask: Can Contribution Data Unveil Malicious Personas in Open-Source Projects?

Research Paper

In February 2024, after building trust over two years with project maintainers by making a significant volume of legitimate contributions, GitHub user "JiaT75" self-merged a version of the XZ Utils project containing a highly sophisticated well-disguised backdoor targeting sshd processes running on systems with the backdoored package installed.

  • 13 May 2025
  • SANS Institute

Catching the Hand in the Cookie Jar: Canary Session Cookies

Research Paper

This project demonstrates how even applications secured with MFA are still vulnerable to hijacked session cookies. Given the persistent threats posed to organizations by stolen authentication cookies, this research proposes implementing Canary session cookies to detect the theft and malicious use of credentials.

  • 17 Apr 2025

A Pebble In the Ocean: Maximizing Log Fidelity In Container Environments

Research Paper

Log fidelity is crucial for Incident Response Teams to investigate and contain cyber incidents but can be difficult to optimize in containerized environments.

  • 17 Apr 2025

SANS 2025 Threat Hunting Survey: Advancements in Threat Hunting Amid AI and Cloud Challenges

Research Paper

The 2025 SANS Threat Hunting Survey marks a decade of tracking how organizations evolve their threat hunting capabilities.

  • 13 Mar 2025
  • Josh Lemon

Empowering Responders with Automated Investigation

Research Paper

This white paper investigates how Binalyze’s AIR platform reduces the overhead of forensic investigations by automating the process of collecting artifacts, triaging the data, and identifying next steps.

  • 18 Feb 2025
  • Megan Roddie-Fonseca

Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success

Research Paper

This paper defines one method of network security monitoring in an organization to find these existing indicators.

  • 7 Jan 2025

Threat Intelligence-Driven Attack Surface Management

Research Paper

Defenders struggle to keep up with the pace of digital transformation in the face of an expanding...

  • 9 Aug 2022

How to Build and Use an Incident Response Playbook Effectively

Research Paper

An effective incident response playbook provides structure and clarity during high-pressure security events.

  • 25 Jul 2022

Windows 10 vs. Windows 11, What Has Changed?

Research Paper

Windows 10 was released on July 29, 2015. It has since become the most installed desktop operating...

  • 25 Jul 2022

Malware Function-based encryption technique

Research Paper

Recent malware often uses techniques to evade detection by cybersecurity products. One of the...

  • 22 Jun 2022

Detecting Unauthorized Behavior From Legitimate Accounts

Research Paper

Incident Responders face an almost insurmountable amount of log events, and the move to the Cloud...

  • 22 Jun 2022

Recommendations for small/medium-sized businesses enabling incident response

Research Paper

Security incidents are inevitable. While large businesses can afford security teams to prepare and...

  • 17 Jan 2022

Cloud Forensics Triage Framework (CFTF)

Research Paper

Digital media forensic investigations come in multiple forms and span single assets - from thumb...

  • 28 Jul 2021

EDR Evasion: Stranger Things In A Payload

Research Paper

Tackling enterprise security has many pitfalls. Yet, the emergence of Endpoint Detection and Response (EDR) products has paved a way for threat hunters to act at scale.

  • 28 Jul 2021

CIS CSC Controls vs. Ransomware: An Evaluation

Research Paper

Cybercriminals continue to develop and enhance both new and existing ransomware variants, exploiting...

  • 19 May 2021

Missing SQLite Records Analysis

Research Paper

This article will specifically discuss the identification of missing records, within the SQLite...

  • 12 Mar 2021
  • Ian Whiffin

Insider Threat The Theft of Intellectual Property in Windows 10

Research Paper

The prevalence of the theft of intellectual property investigations has grown over the past years...

  • 11 Mar 2021

A Forensic Analysis of the Encrypting File System

Research Paper

EFS or the Encrypting File System is a feature of the New Technology File System (NTFS). EFS...

  • 24 Feb 2021

Tactical Linguistics: Language Analysis in Cyber Threat Intelligence

Research Paper

The capability to effectively collect and analyze data in strategic foreign languages when...

  • 15 Jan 2021

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.