In cybersecurity, the question isn't whether a security incident will transpire, but rather when it will occur. This is why we require incident response reports to act as a conduit between the identification and remediation of threats.
It serves to archive past incidents, providing an invaluable source of lessons learned from previous mistakes. The learnings can be seamlessly integrated into a broader strategy for preempting and mitigating future threats.
Essentially, an incident response report encompasses the process by which an organization handles a breach. It aims to quickly identify an attack, minimize damage, contain, and remediate the cause to reduce the risk of future incidents.
A real-world example of an incident response report created by the HTB Academy team. Use it as a template for your next report!
Incident Response (IR) reports are the true narrative of a cybersecurity incident's handling capturing the good, the bad, and the ugly. When accurately written, they serve as a critical platform for reflection and adjustment, spotlighting gaps in processes, people, and technology.
The real power of these reports lies in their ability to turn hindsight into foresight, allowing teams and organizations to rectify issues before they escalate into more significant threats.
Sabastian Hague (sebh24), Defensive Content Lead, Hack The Box
Incident response plans are critical as they help limit and mitigate a security breach's impact. This helps manage an organization’s financial and reputational damage while providing a blueprint for future incidents.
As a result, cybersecurity teams can consistently respond to attacks.
Writing effective incident response reports means striking a balance between detail and accessibility. A good report should be understandable to both technical and non-technical audiences.
A well-organized incident report is a clarifying tool for stakeholders across various functions, including legal departments ensuring regulatory compliance, executive management assessing risk profiles, and CFOs evaluating financial repercussions.
This clarity benefits the overall incident response process:
Learn how security incident reporting works
Our Academy module on Security Incident Reporting teaches teams everything they need to know about documenting and reporting an incident.
Organizations are threatened by many different attacks. So, a systematic approach to identifying and classifying security incidents is required.
How can we quickly identify security incidents? These are the three main sources:
Source
Description
Some excellent sources for identification include IDS/IPS, EDR/XDR, SIEM tools, or even basic anti-virus alerts and NetFlow data.
Users may notice and report suspicious activities, unusual emails, or systems behaving abnormally.
Partners, vendors, or even customers might inform organizations about any vulnerabilities or breaches they are experiencing.
Once an incident has been identified, it must quickly be categorized as this will impact the prioritization and allocation of appropriate resources.
Common incident types include:
Now that the nature of the incident has been categorized, individuals will be able to refer to incident response plans and past reports to understand how to react.
But what about prioritization? We can classify incidents with the following severity levels:
A solid incident reporting process will serve as a cohesive framework to identify, mitigate, retain, and remediate security breaches.
Here is the step-by-step report process that should be followed in the event of an incident:
Before we can report on an incident, we must first detect and acknowledge it. As mentioned previously, incidents can be detected via tools, humans, or a third party. Threat actors can also detect themselves, for example, when asking for a ransom.
During this phase, the scope and potential ramifications of the security incident must be determined. The incident should be categorized based on our previously established classification and severity metrics.
Every action and observation related to the security incident should be meticulously logged using an established system.
Popular platforms for this purpose include JIRA and TheHive Project.
Lacking a system in place? Spreadsheets can also be used and even old-school pen and paper in the worst-case scenario!
Stakeholders and wider teams must be quickly notified about any security incidents. These can be separated into two groups:
The duration of this phase can vary significantly. Ranging from a couple of days to potentially years. What's crucial here is a comprehensive technical analysis coupled with a compilation of all findings. This in-depth investigation is vital for understanding the incident's full impact.
The culmination of your role as a security analyst or incident responder is the creation of a finalized incident report. This document will provide regulators, insurers, and executive leadership with a detailed account of the incident, its origins, and the remedial actions taken.
Post-incident reflection is essential for enhancing our preparedness for future incidents. This involves revisiting and analyzing the incident to identify areas for improvement.
This is the opening to the report, designed to speak to a broad audience and so it’s advised to avoid too many technical details.
Its purpose is to provide readers with a succinct overview, key findings, immediate actions executed, and the impact on stakeholders.
Since many stakeholders may only read the executive summary, it's essential to get this section right. Here’s what should be included:
Section
Description
Unique identifier for the incident.
Provide a concise summary of the incident's events and explicitly state its type. This should also encompass the estimated time and date of the incident, as well as its duration, the affected systems/data, and the status.
Enumerate any findings that emerged from the incident. What was the root cause? Was a specific CVE exploited? What data, if any, was compromised, exfiltrated, or jeopardized?
Immediate Actions Taken
Outline the immediate response measures taken. Were the affected systems promptly isolated? Was the root cause identified? Did we engage any third-party services, and if so, who were they?
Assess the potential impact on various stakeholders. For instance, did any customers experience downtime, and what are the financial ramifications? Was employee data compromised?
In this section we dive into, you guessed it, the technical side of things.
This is the largest part of an incident response report and it should include the following:
This is where an evaluation of the adverse effects that the incident had on the organization's data, operations, and reputation will be recorded.
This analysis aims to quantify the extent of the damage caused by the incident, identifying which systems, processes, or data sets have been compromised. It also assesses the potential business implications, such as financial loss, regulatory penalties, and reputational damage.
Outline the specific actions taken to contain the security incident, eradicate the threat, and restore normal operations.
This section usually includes:
Revocation of access
Containment strategy
Malware removal
System patching
Data restoration
System validation
Monitoring
Lessons learned
Being such a text-heavy and technical report, diagrams can help to communicate the incident more effectively.
Creating an incident flowchart, affected systems map, and attack vector diagram can be hugely beneficial.
Utilize arrows and annotations to trace the attacker's navigation and (post-)exploitation activities through our defenses visually.
A section for supplementary material that provides additional context, evidence, or technical details that are crucial for a comprehensive understanding of the incident, its impact, and the response actions taken.
Despite being the final part of an incident report, it’s an essential piece of the puzzle as the appendices provide credibility and depth to the narrative presented in the main body of the report.
Some of the following might be included here:
We’ve established just how important effective communication is in the face of an incident. But how do we keep critical information under wraps while remaining compliant?
Here are our top tips:
Now that you know how to write your own incident response report, we wanted to share some key takeaways you should always prioritize:
While no one wants to have to report an incident, it’s common practice in the world of analysts. Learn all about incident reporting on Academy, and explore our SOC Analyst path for more defensive-related content.
Author Bio: Sabastian Hague (sebh24), Defensive Content Lead, Hack The Box
Sabastian Hague is a seasoned cybersecurity professional with over eight years of experience in the field. After serving in the Royal Air Force as a specialist in all things SOC, he went on to work for Vodafone's global CERT team before taking on a role as a senior security consultant with SpiderLabs and working on numerous high-profile incidents. He is now the Defensive Content Lead at Hack The Box.
Seb has numerous industry certifications, including GIAC Certified Detection Analyst (GCDA), GIAC Continuous Monitoring Certification (GMON), GIAC Certified Incident Handler (GCIH), GIAC Certified Intrusion Analyst, Offensive Security Certified Professional (OSCP), Blue Team Level 1 (BTL1), Blue Team Level 2 (BTL2), Cybereason Threat Hunter (CCTH).
You can connect with him on LinkedIn or Twitter.