Incident Management Checklist
Last updated
Last updated
Identification Tasks
Contents of Tasks:
Monitor and analyze security alerts
Validate the incident
Assign severity to the incident
Log initial incident details
Notify the incident response (IR) team
Remediation Tasks
Contents of Tasks:
Contain the incident short-term and long-term
Eradicate the root cause
Validate system functionality
Implement system enhancements
Notify external entities if needed (such as law enforcement or customers)
Document actions taken and outcomes
Other Matters Regarding Tasks
Contents:
After-action review: Analyze what happened and why, what was effective, and what can be improved.
Knowledge sharing: Ensure learnings and insights from the incident are shared with relevant stakeholders.
Updating protocols: Adjust policies and protocols as necessary to prevent repeat incidents.
Malware Features Checklist
Behavior Analysis:
Does the malware generate any network traffic?
Does it create or modify files?
What processes does it run?
Is it persistent after a reboot?
Static Properties:
File hash (MD5, SHA-1, SHA-256)
File size
File type (file signature)
File path and name
Infection Vector:
How is it propagated (email, web, removable drives)?
Does it exploit any known vulnerabilities?
Is it propagated via social engineering?
Payload:
Is it ransomware, spyware, a trojan, a worm, or something else?
Does it exfiltrate data?
What kinds of data does it target (credentials, personal data, etc.)?
Does it have any destructive capabilities?
Evasion Techniques:
Does it have anti-analysis capabilities (like sandbox detection)?
Does it employ any obfuscation techniques?
Does it have rootkit functionalities to hide its presence?
Command and Control (C2):
Does it communicate with a C2 server?
What is the IP address/domain of the C2?
What protocols does it use to communicate?
Persistence Mechanism:
How does it ensure it remains on the infected system?
Does it create or modify registry entries?
Does it create or manipulate scheduled tasks?