The 6 Phases of Incident Response — PICERL
CompTIA follows the PICERL model (also aligned with NIST SP 800-61). Memorise the acronym and what each phase involves — the exam will give you a scenario and ask which phase is being performed.
Memorise the order: Preparation → Identification → Containment → Eradication → Recovery → Lessons Learned. The exam gives scenarios like "After removing malware, the team verifies the system is clean and reconnects it to the network" — that's Recovery, not Eradication.
Containment before Eradication is the most common wrong-order trap. You contain first (stop the spread), then eradicate (remove the threat). Jumping to eradication while the attacker still has active access can alert them and cause them to destroy evidence or cause more damage.
Evidence preservation is always priority in Identification. If the exam asks "What should the first responder do first?" the answer is almost always preserve evidence (memory dump, disk image) before taking action that might alter it.
Indicators of Compromise (IoCs)
IoCs are evidence that a system or network has been compromised. Recognising IoCs is tested in the Identification phase:
| IoC Type | Examples | What It Suggests |
|---|---|---|
| Network IoCs | Unusual outbound traffic, connections to known malicious IPs, DNS queries to suspicious domains, traffic on unusual ports, large data transfers at off-hours | Command-and-control (C2) communication, data exfiltration, beaconing malware |
| Host IoCs | Unexpected processes running, new scheduled tasks or startup entries, modified system files, disabled security tools, new user accounts created, privilege escalation events | Malware persistence, attacker maintaining foothold, lateral movement |
| Account IoCs | Login at unusual times or from unusual locations, multiple failed logins followed by success, accounts accessing resources they never have before, new admin accounts | Credential compromise, brute force attack, insider threat |
| Log IoCs | Gaps in log data (logs cleared or deleted), mass log events, Event ID 4624 (successful login) from unusual source, Event ID 4720 (account created) | Attacker covering tracks, automated attack tools running |
| File IoCs | Unknown executables, files with double extensions (.pdf.exe), files in unusual locations (%temp%, AppData), recently modified system binaries, files with no creation date | Malware dropped on system, trojanised applications |
Containment Strategies
| Strategy | How It Works | When to Use |
|---|---|---|
| Network Isolation | Remove the affected system from the network (unplug cable, disable network adapter, quarantine VLAN) — stops lateral movement and C2 communication | Active malware infection, suspected compromise — isolate immediately while preserving the system for forensics |
| Segmentation | Use VLANs and firewall rules to limit the blast radius — contain the incident to the affected segment without taking entire network offline | When full isolation isn't possible due to business continuity requirements |
| Account Disable / Reset | Disable or change credentials on compromised accounts to cut off attacker access without alerting them that they've been detected (if using a separate account) | Credential compromise, insider threat, account takeover |
| Blackholing / Sinkholing | Redirect malicious domain DNS queries to a controlled server (sinkhole) instead of the attacker's C2 — cuts C2 communication while allowing you to monitor what was infected | Malware using domain generation algorithms (DGA) for C2 |
| System Shutdown | Power off the affected system — most aggressive option, destroys volatile memory (RAM) containing evidence | Last resort — only if the system is actively causing harm and forensics are not a priority |
Digital Forensics in Incident Response
When legal action is possible or required, evidence must be collected following forensic principles to be admissible:
Evidence should be collected from most volatile to least volatile — data that disappears first must be captured first:
1. CPU registers and cache → 2. RAM (memory dump) → 3. Swap/page file → 4. Running processes and network connections → 5. Disk contents → 6. Remote logs and monitoring data → 7. Physical media (backups, removable drives)
RAM is lost the moment the system is powered off — always capture a memory image before shutting down a compromised system if forensics matter.
| Forensic Concept | What It Means |
|---|---|
| Chain of Custody | A documented record of who collected evidence, who handled it, where it was stored, and who had access — ensures evidence integrity and admissibility in legal proceedings |
| Legal Hold | A directive to preserve all potentially relevant data — stops normal deletion schedules, backup rotation, and log purging for the scope of the investigation |
| Forensic Copy | A bit-for-bit copy of a disk or memory image — preserves all data including deleted files. Work from the copy, never the original evidence. |
| Write Blocker | Hardware or software that prevents writes to the evidence drive during imaging — ensures the imaging process doesn't modify the evidence |
| Hash Verification | Hash the evidence (SHA-256) before and after imaging — proves the copy is identical to the original and has not been tampered with |
| Timeline Analysis | Reconstructing the sequence of events using log timestamps, file system metadata, and event records to establish when and how the compromise occurred |
IR Communication and Escalation
Who gets notified during an incident, and when, is a heavily tested Security+ topic. The wrong communication at the wrong time can tip off an insider threat, compromise an investigation, or create legal liability:
| Stakeholder | When to Notify | Exam Note |
|---|---|---|
| Senior Management | Early — as soon as the severity is understood. Management makes business decisions about containment trade-offs (taking systems offline, cost of downtime). | Management decides to shut down operations; IR team advises on technical options |
| Legal Counsel | Early — before any public disclosure or communication with law enforcement. Legal determines reporting obligations. | Regulatory requirements (GDPR, HIPAA, PCI-DSS) mandate breach notification timelines |
| HR | If insider threat is suspected — HR involvement required for disciplinary actions and ensuring proper process is followed | HR and legal must be involved before any insider is confronted or terminated |
| Law Enforcement | After consulting legal — not all incidents require law enforcement; oversharing can complicate investigations | Law enforcement involvement may restrict what the organisation can do with its own systems |
| Affected Users / Public | After containment, per legal requirements — premature disclosure can cause panic or tip off attackers | Notification timing and content is a legal requirement in many jurisdictions for data breaches |
Exam Scenarios
Studying for Security+?
See the study guides and practice exams that cover the full SY0-701 exam.