Cybersecurity IncidentResponse Preparedness

Contributors

Laszlo S. Gonc
Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence
Image
Cybersecurity Incident Response Preparedness

Awareness is growing that organizations of all sizes lack cybersecurity incident response preparedness. Companies regardless of size are not exempt from cybersecurity threats. Being prepared with an established plan of action to immediately execute following a security incident is crucial to limit incident costs and damages to the organization’s technical infrastructure, operations, and reputation.

“The majority of companies — 77% of respondents — don’t have a cybersecurity incident response plan applied across the enterprise,” according to a 2019 study conducted by the Ponemon Institute.

According to this study one of the primary reasons for this is the well-documented security skills shortage. It is particularly severe in incident response because it is a newer discipline for many companies. Survey respondents said they lack the headcount to create, maintain and test their incident response plans. Only 30% of respondents reported staffing for security is sufficient to achieve a high level of cyber resilience.

INCIDENT RESPONSE (IR) FRAMEWORK VS PLAYBOOK

An incident response framework provides a structure to support incident response operations. A framework typically provides guidance on what needs to be done, but not on how it is done. A framework is flexible enough to allow elements to be added or removed as necessary to satisfy a particular organization’s needs.

An incident response plan has a goal delivering effective incident response through a detailed set of steps. An incident response plan details the processes needed to deal with cybersecurity incidents, calls out the resources required, and outlines the communication and escalation paths required for plan operation.

Together the framework suggests logical elements that should be included in a plan. A plan includes those elements as well as elements of mission, services, people, process, technology and facilities. With this in mind, it helps to understand two (2) industry incident response frameworks to determine the best approach for your organization.

The NIST Incident Response Framework

The National Institute of Standards and Technology (NIST) is responsible for developing information security standards and guidelines, including minimum standards for federal information systems. The NIST “Computer Security Incident Handling Guide” includes an incident response framework in the form of an incident response lifecycle.

The four stages of the NIST incident response lifecycle are preparation; detection and analysis; containment, eradication and recovery; and post-incident activity. Here’s a look at each one in some detail.

Phase 1: Preparation. The quality of incident response largely depends on incident response preparation. In this preparation phase of the lifecycle, all the components needed to respond effectively to a computer security incident are identified, created or acquired.

Phase 2: Detection and Analysis. While the capability to detect incidents is set up as part of the preparation phase, incident detection starts the incident response process. Incidents cannot be responded to until detection occurs.

Phase 3: Containment, Eradication and Recovery. Containment follows the detection and validation of a security incident. The goals of containment are simple – stop the problem from getting worse (i.e., limit the damage); and regain control of systems and network.

Phase 4: Post-incident activity. Post-incident activity centers on lessons learned to accomplish two things: Improve the incident response capability and prevent the incident from recurring.

The ISO Incident Response Framework

The International Organization for Standardization (ISO) is an independent non-governmental international standards organization. The ISO standard details how individuals should “detect, report and assess information security incidents; respond to information security incidents … report information security vulnerabilities … learn from information security incidents and vulnerabilities, institute preventive controls, and make improvements to the overall approach to information security incident management.”

ISO/IEC 27035-1:2016 outlines the principles underlying information security incident management, which is structured into five (5) parts:

PART 1. Planning and Preparation.
Establish an information security incident management policy.
Create an incident response team.

PART 2. Detection and Reporting.
Set up the processes, procedures and technology required to detect and report the incident.

PART 3. Assessment and Decision.
Set up processes and procedures.
Establish incident descriptions and criteria.

PART 4. Response to Incidents.
Establish controls to prevent, respond and recover from incidents.

PART 5. Lessons Learned.
Learn from security incidents and improve overall computer security incident management.

COMPARISON

NIST and ISO 27035-1 are similar in approach to each other. However, there is an important and subtle difference. The NIST “Computer Security Incident Handling Guide” focuses on incident handling which deals with the prevention, detection and responding to incidents. ISO 27035-1 focuses on incident management, which is integrated broadly into other business management and risk reduction functions outside of the incident response organization.

SUMMARY

So which framework should you choose? Should you choose one framework in its entirety or should you choose part of one and combine it with parts of another framework in a kind of incident response a la carte? When considering whether to adopt a framework as is or build your own, these are some things to think about:

  • Are your business operations within the US borders or global?
  • Are you publicly traded or privately held?
  • What are the requirements of your regulatory and compliance landscape? Are you highly regulated?
  • Do you have obligations under the Federal Information Systems Management Act (FISMA)?
  • What are your contractual obligations with your business and trading partners?

There are certainly more questions to be assessed. Consider an appropriate framework that provides structure to guide the incident response plan. Building the incident response plan on the framework, not the framework itself, enables your organization to create the resilience needed to support your business.

Get the latest insights straight from our desk to your inbox.

Other Featured Articles

Explore More
Network-penetration-testion-blog-banner

How to Perform a Successful Network Penetration Test: Comprehensive Guide for 2025

Learn how to perform a successful network penetration test to identify vulnerabilities, simulate real cyberattacks, and strengthen your organization’s network security.

Cybersecurity Solution Group
Marketing Group view
Penetration-testing-banner-image

What Is Penetration Testing? A 2026 Expert Guide

A 2026 expert guide to penetration testing for security leaders and IT teams seeking proactive defense, compliance, and stakeholder trust.

Cybersecurity Solution Group
Marketing Group view
ot-ransomware-prevention-banner-image

OT Ransomware Prevention: Practical Best Practices for Industrial Cybersecurity

Explore enterprise grade OT ransomware prevention strategies, including segmentation, identity control, threat informed detection, and resilient recovery design to protect industrial operations fro

Cybersecurity Solution Group
Marketing Group view
OT-Ransomware-Risks-and-Response-Banner

10 Myths About OT/ICS Security That Put Your Business at Risk

Think your OT network is secure? Learn the 10 most dangerous myths about OT and ICS cybersecurity that leave industrial operations exposed to attacks.

Cybersecurity Solution Group
Marketing Group view
OT-Ransomware-Risks-and-Response-Banner

OT Ransomware Risks and Response for Industrial Systems

Learn why OT environments face higher ransomware risk, how attackers gain access, and how effective detection and response reduce operational impact.

Cybersecurity Solution Group
Marketing Group view
AI-Risk-Assessment-Best-Practices-Banner

AI Risk Assessment: Risk Types, Best Practices & More

Explore AI risk types, essential assessment frameworks, and proven best practices to mitigate threats in AI deployment. Learn actionable strategies for secure AI systems today.

Cybersecurity Solution Group
Marketing Group view
AI Risk Assessment Banner Image

AI Risk Assessment: Everything You Need to Know

Learn essential processes, methodologies, risk types, regulatory requirements, and practical implementation strategies for safe AI deployment.

Cybersecurity Solution Group
Marketing Group view
Whitepaper: Ransomware Threat Management

Whitepaper: Ransomware Threat Management

Ransomware continues to be a real threat to business operations across all industries, no organization is safe from this threat.

Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence view
Cybersecurity Incident Response Preparedness

Cybersecurity Incident Response Preparedness

An incident response framework provides a structure to support incident response operations. A framework typically provides guidance on what needs to be done, but not on how it is done.

Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence view
Internet of Things

IoT Medical Device Cybersecurity

Healthcare data and medical devices would be aggressively targeted by ransomware attacks since early 2017 has proven to be true

Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence view
Back
to Top