CySA+ Study Guide: Incident Response (IR) – 14%

📌 Overview

The Incident Response (IR) domain of the CompTIA CySA+ CS0-003 exam emphasizes a structured approach to handling cybersecurity incidents. From preparation to recovery, you need to understand how to contain and mitigate threats quickly and efficiently.

📋 IR Lifecycle Phases

🔐 Key Incident Response Terms

Understanding key terms is essential for mastering the Incident Response (IR) domain. These terms form the foundation of effective incident handling and ensure a structured approach to managing security events.

Term Definition
Chain of Custody Tracks the handling of evidence through each stage of the investigation. Tracks the handling of evidence through each stage of the investigation. Maintaining an unbroken chain ensures evidence integrity and admissibility in legal proceedings. Learn more about evidence handling from SANS Evidence Collection Guide.
Playbook Predefined response procedures for specific incident types. Predefined response procedures for specific incident types. For example, a ransomware playbook may include steps for isolating affected systems, identifying encryption methods, and notifying stakeholders. Explore playbook templates at CIS Incident Response Playbooks.
IOC (Indicator of Compromise) Evidence suggesting a system has been breached. Evidence suggesting a system has been breached. Examples include unusual network traffic, unauthorized file changes, or malicious IP addresses. Learn more about IOCs from Mandiant's IOC Guide.
RCA (Root Cause Analysis) Identifies the origin of a problem or incident. Identifies the origin of a problem or incident. RCA helps prevent recurrence by addressing the underlying cause rather than just the symptoms. Refer to NIST's Root Cause Analysis Methodology.
MTTD Mean Time to Detect – the average time it takes to discover an incident. Mean Time to Detect – the average time it takes to discover an incident. Lowering MTTD is critical for minimizing damage. Tools like Splunk and ELK Stack can help reduce detection times.
MTTR Mean Time to Respond – the average time it takes to resolve an incident. Mean Time to Respond – the average time it takes to resolve an incident. Automation tools like Cortex XSOAR can significantly reduce MTTR by streamlining response workflows.

🛠 Tools & Techniques

Category Tool Description
Disk Imaging FTK Imager Create forensic disk images; supports previews and integrity verification.
Disk Imaging dd Command-line utility for bit-by-bit disk copying in Linux/Unix environments.
Disk Imaging Autopsy GUI forensics suite; works with Sleuth Kit for analyzing disk images.
Log Analysis Splunk Popular SIEM for log aggregation, correlation, and visualization.
Log Analysis ELK Stack Open-source suite (Elasticsearch, Logstash, Kibana) for managing and analyzing logs.
Log Analysis syslog Standard logging protocol in Unix/Linux environments.
Network Monitoring Zeek (Bro) Network analysis framework focused on network behavior and protocols.
Network Monitoring Wireshark Industry-standard packet analyzer for inspecting network traffic.
Malware Analysis Cuckoo Sandbox Automated malware analysis system using virtual machines.
Malware Analysis Any.Run Interactive online malware sandbox to visualize and analyze threats.

✅ Best Practices

📖 Further Reading