The four NIST incident response phases
NIST SP 800-61 defines incident response in four phases that cycle continuously. Preparation comes first and is arguably the most important. During preparation, organizations build their incident response plan, train the incident response team, establish communication channels, deploy monitoring tools, and practice through tabletop exercises. Preparation is what determines how fast and how effectively everything else happens when an incident occurs.
Detection and Analysis is where you discover that something is wrong and confirm it is an actual incident rather than a false positive. Detection comes from SIEM alerts, IDS signatures, user reports, or threat intelligence. Analysis determines the scope, the attack vector, the affected systems, and the severity. Poor analysis leads to incomplete containment and recurring incidents.
Containment, Eradication, and Recovery happen in sequence. Containment stops the bleeding: isolate affected systems, block malicious IPs, disable compromised accounts. Short-term containment is fast but may lose evidence. Long-term containment preserves systems for forensic analysis while keeping the business running. Eradication removes the attacker's artifacts: malware, backdoors, unauthorized accounts. Recovery restores systems to normal operation, monitored closely to confirm the attacker has not returned.
Post-Incident Activity, also called lessons learned, is the phase most organizations skip when they are eager to return to normal. This is a structured review of what happened, what worked, what failed, and what needs to change. The output is an updated incident response plan and often new monitoring rules, patched systems, or changed procedures.
Key incident response concepts
Chain of custody is critical if the incident results in legal action. Evidence must be collected, documented, and stored in a way that proves it has not been tampered with. Every person who handles evidence must be logged, and the documentation trail must be unbroken from collection through presentation.
Containment strategy selection depends on the type of incident. For ransomware that has only hit one workstation, immediate isolation may be right. For an advanced persistent threat that has been in the network for months, premature containment can tip the attacker off and cause them to destroy evidence or deploy additional malware before you have fully scoped the compromise.
Communication during incidents is structured. Internally, the IR team communicates with executive leadership and legal. Externally, depending on the incident type and jurisdiction, the organization may be legally required to notify regulators, affected customers, or law enforcement within specific time windows.
How to choose the correct answer
Phase sequence: Preparation, Detection and Analysis, Containment/Eradication/Recovery, Post-Incident Activity. Questions often test what belongs in each phase.
Preparation activities: IR plan creation, team training, tabletop exercises, tool deployment. These all happen before any incident.
First step after detecting an incident: analysis to confirm it is a real incident and determine scope. Not containment. Not eradication. Understand before acting.
Lessons learned timing: after recovery, before the next incident. Skipping this phase means repeating the same mistakes.
Evidence collection order: most volatile to least volatile (live memory before disk images).