incident-response

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

Incident Response

事件响应

Incident response skill for the full lifecycle from initial triage through forensic collection, severity declaration, and escalation routing. This is NOT threat hunting (see threat-detection) or post-incident compliance mapping (see governance/compliance-mapping) — this is about classifying, triaging, and managing declared security incidents.

本技能针对从初始分诊到取证收集、严重等级宣布以及升级路由的完整生命周期提供事件响应能力。注意:这不是威胁狩猎(请参考threat-detection)或事件后合规映射(请参考governance/compliance-mapping)——而是针对已宣布的安全事件进行分类、分诊和管理。

Table of Contents

目录

Overview

概述

What This Skill Does

本技能的功能

This skill provides the methodology and tooling for incident triage and response — classifying security events into typed incidents, scoring severity, filtering false positives, determining escalation paths, and initiating forensic evidence collection under chain-of-custody controls.
本技能为事件分诊与响应提供方法论和工具支持——将安全事件分类为特定类型的事件、评估严重等级、过滤误报、确定升级路径,并在监管链控制下启动取证证据收集。

Distinction from Other Security Skills

与其他安全技能的区别

SkillFocusApproach
incident-response (this)Active incidentsReactive — classify, escalate, collect evidence
threat-detectionPre-incident huntingProactive — find threats before alerts fire
cloud-securityCloud posture assessmentPreventive — IAM, S3, network misconfiguration
red-teamOffensive simulationOffensive — test detection and response capability
技能关注点方法
incident-response(本技能)活跃事件被动响应——分类、升级、收集证据
threat-detection事件前狩猎主动防御——在警报触发前发现威胁
cloud-security云态势评估预防措施——IAM、S3、网络配置错误修复
red-team攻击性模拟攻击测试——检测和响应能力测试

Prerequisites

前置条件

A security event must be ingested before triage. Events can come from SIEM alerts, EDR detections, threat intel feeds, or user reports. The triage tool accepts JSON event payloads; see the input schema below.

分诊前必须先接入安全事件。事件可来自SIEM警报、EDR检测、威胁情报源或用户报告。分诊工具接受JSON事件负载;请参阅下方的输入 schema。

Incident Triage Tool

事件分诊工具

The
incident_triage.py
tool classifies events, checks false positives, scores severity, determines escalation, and performs forensic pre-analysis.
bash
undefined
incident_triage.py
工具可对事件进行分类、检查误报、评估严重等级、确定升级路径,并执行取证预分析。
bash
undefined

Classify an event from JSON file

从JSON文件分类事件

python3 scripts/incident_triage.py --input event.json --classify --json
python3 scripts/incident_triage.py --input event.json --classify --json

Classify with false positive filtering enabled

启用误报过滤进行分类

python3 scripts/incident_triage.py --input event.json --classify --false-positive-check --json
python3 scripts/incident_triage.py --input event.json --classify --false-positive-check --json

Force a severity level for tabletop exercises

为桌面演练强制设置严重等级

python3 scripts/incident_triage.py --input event.json --severity sev1 --json
python3 scripts/incident_triage.py --input event.json --severity sev1 --json

Read event from stdin

从标准输入读取事件

echo '{"event_type": "ransomware", "host": "prod-db-01", "raw_payload": {}}' |
python3 scripts/incident_triage.py --classify --false-positive-check --json
undefined
echo '{"event_type": "ransomware", "host": "prod-db-01", "raw_payload": {}}' |
python3 scripts/incident_triage.py --classify --false-positive-check --json
undefined

Input Event Schema

输入事件Schema

json
{
  "event_type": "ransomware",
  "host": "prod-db-01",
  "user": "svc_backup",
  "source_ip": "10.1.2.3",
  "timestamp": "2024-01-15T14:32:00Z",
  "raw_payload": {}
}
json
{
  "event_type": "ransomware",
  "host": "prod-db-01",
  "user": "svc_backup",
  "source_ip": "10.1.2.3",
  "timestamp": "2024-01-15T14:32:00Z",
  "raw_payload": {}
}

Exit Codes

退出码

CodeMeaningRequired Response
0SEV3/SEV4 or cleanStandard ticket-based handling
1SEV2 — elevated1-hour bridge call, async coordination
2SEV1 — criticalImmediate 15-minute war room, all-hands

代码含义所需响应
0SEV3/SEV4或无风险标准工单处理
1SEV2——高优先级1小时桥接会议、异步协调
2SEV1——严重立即启动15分钟作战室、全员响应

Incident Classification

事件分类

Security events are classified into 14 incident types. Classification drives default severity, MITRE technique mapping, and response SLA.
安全事件被分为14种类型。分类决定默认严重等级、MITRE Technique映射和响应SLA。

Incident Taxonomy

事件分类体系

Incident TypeDefault SeverityMITRE TechniqueResponse SLA
ransomwareSEV1T148615 minutes
data_exfiltrationSEV1T104815 minutes
apt_intrusionSEV1T156615 minutes
supply_chain_compromiseSEV1T119515 minutes
domain_controller_breachSEV1T1078.00215 minutes
credential_compromiseSEV2T11101 hour
lateral_movementSEV2T10211 hour
malware_infectionSEV2T12041 hour
insider_threatSEV2T10781 hour
cloud_account_compromiseSEV2T1078.0041 hour
unauthorized_accessSEV3T11904 hours
policy_violationSEV3N/A4 hours
phishing_attemptSEV4T1566.00124 hours
security_alertSEV4N/A24 hours
事件类型默认严重等级MITRE Technique响应SLA
ransomware(勒索软件)SEV1T148615分钟
data_exfiltration(数据泄露)SEV1T104815分钟
apt_intrusion(APT入侵)SEV1T156615分钟
supply_chain_compromise(供应链攻击)SEV1T119515分钟
domain_controller_breach(域控制器入侵)SEV1T1078.00215分钟
credential_compromise(凭证泄露)SEV2T11101小时
lateral_movement(横向移动)SEV2T10211小时
malware_infection(恶意软件感染)SEV2T12041小时
insider_threat(内部威胁)SEV2T10781小时
cloud_account_compromise(云账户泄露)SEV2T1078.0041小时
unauthorized_access(未授权访问)SEV3T11904小时
policy_violation(违反政策)SEV3N/A4小时
phishing_attempt(钓鱼尝试)SEV4T1566.00124小时
security_alert(安全警报)SEV4N/A24小时

SEV Escalation Triggers

SEV升级触发条件

Any of the following automatically re-declare a higher severity:
TriggerNew Severity
Ransomware note foundSEV1
Active exfiltration confirmedSEV1
CloudTrail or SIEM disabledSEV1
Domain controller access confirmedSEV1
Second system compromisedSEV1
Exfiltration volume exceeds 1 GBSEV2 minimum
C-suite account accessedSEV2 minimum

以下任一情况会自动提升严重等级:
触发条件新严重等级
发现勒索软件通知SEV1
确认正在进行数据泄露SEV1
CloudTrail或SIEM被禁用SEV1
确认域控制器被访问SEV1
第二个系统被入侵SEV1
泄露数据量超过1GB最低SEV2
C-suite账户被访问最低SEV2

Severity Framework

严重等级框架

SEV Level Matrix

SEV等级矩阵

LevelNameCriteriaSkills InvokedEscalation Path
SEV1CriticalConfirmed ransomware; active PII/PHI exfiltration (>10K records); domain controller breach; defense evasion (CloudTrail disabled); supply chain compromiseAll skills (parallel)SOC Lead → CISO → CEO → Board Chair
SEV2HighConfirmed unauthorized access to sensitive systems; credential compromise with elevated privileges; lateral movement confirmed; ransomware indicators without confirmed executiontriage + containment + forensicsSOC Lead → CISO
SEV3MediumSuspected unauthorized access (unconfirmed); malware detected and contained; single account compromise (no priv escalation)triage + containmentSOC Lead → Security Manager
SEV4LowSecurity alert with no confirmed impact; informational indicator; policy violation with no data risktriage onlyL3 Analyst queue

等级名称判定标准调用技能升级路径
SEV1严重确认勒索软件;活跃的PII/PHI泄露(>10000条记录);域控制器入侵;防御规避(CloudTrail禁用);供应链攻击所有技能(并行)SOC主管 → CISO → CEO → 董事会主席
SEV2确认敏感系统被未授权访问;高权限凭证泄露;确认横向移动;存在勒索软件迹象但未确认执行分诊 + 遏制 + 取证SOC主管 → CISO
SEV3疑似未授权访问(未确认);检测到恶意软件并已遏制;单个账户泄露(无权限提升)分诊 + 遏制SOC主管 → 安全经理
SEV4无确认影响的安全警报;信息性指标;无数据风险的政策违反仅分诊L3分析师队列

False Positive Filtering

误报过滤

The triage tool applies five filters before escalating to prevent false positive inflation.
分诊工具应用五种过滤器,避免误报导致的升级泛滥。

False Positive Filter Types

误报过滤类型

FilterDescriptionExample Pattern
CI/CD agent activityKnown build/deploy agents flagged as anomaliesjenkins, github-actions, circleci, gitlab-runner
Test environment taggingAssets tagged as non-productiontest-, staging-, dev-, sandbox-
Scheduled job patternsExpected batch processes triggering alertscron, scheduled_task, batch_job, backup_
Whitelisted identitiesExplicitly approved service accountssvc_monitoring, svc_backup, datadog-agent
Scanner activityKnown security scanners and vulnerability toolsnessus, qualys, rapid7, aws_inspector
A confirmed false positive suppresses escalation and logs the suppression reason for audit purposes. Recurring false positives from the same source should be tuned out at the detection layer, not filtered repeatedly at triage.

过滤器描述示例模式
CI/CD代理活动已知构建/部署代理被标记为异常jenkins, github-actions, circleci, gitlab-runner
测试环境标记标记为非生产环境的资产test-, staging-, dev-, sandbox-
定时任务模式预期的批处理流程触发警报cron, scheduled_task, batch_job, backup_
白名单身份明确批准的服务账户svc_monitoring, svc_backup, datadog-agent
扫描器活动已知安全扫描器和漏洞工具nessus, qualys, rapid7, aws_inspector
确认的误报会抑制升级,并记录抑制原因用于审计。同一来源的重复误报应在检测层进行调整,而非在分诊层反复过滤。

Forensic Evidence Collection

取证证据收集

Evidence collection follows the DFRWS six-phase framework and the principle of volatile-first acquisition.
证据收集遵循DFRWS六阶段框架和“易失性优先获取”原则。

DFRWS Six Phases

DFRWS六阶段

PhaseActivityPriority
IdentificationIdentify what evidence exists and whereImmediate
PreservationPrevent modification — write-block, snapshot, legal holdImmediate
CollectionAcquire evidence in order of volatilityImmediate
ExaminationTechnical analysis of collected evidenceWithin 2 hours
AnalysisInterpret findings in investigative contextWithin 4 hours
PresentationProduce findings report with chain of custodyBefore incident closure
阶段活动优先级
识别确定证据存在的位置和类型立即
保存防止修改——写保护、快照、法律保留立即
收集按易失性顺序获取证据立即
检查对收集的证据进行技术分析2小时内
分析在调查背景下解读发现4小时内
呈现生成包含监管链的调查报告事件关闭前

Volatile Evidence — Collect First

易失性证据——优先收集

  1. Live memory (RAM dump) — lost on reboot
  2. Running processes and open network connections (
    netstat
    ,
    ps
    )
  3. Logged-in users and active sessions
  4. System uptime and current time (for timeline anchoring)
  5. Environment variables and loaded kernel modules
  1. 实时内存(RAM转储)——重启后丢失
  2. 运行进程和开放网络连接(
    netstat
    ps
  3. 登录用户和活跃会话
  4. 系统运行时间和当前时间(用于时间线锚定)
  5. 环境变量和加载的内核模块

Chain of Custody Requirements

监管链要求

Every evidence item must be recorded with:
  • SHA-256 hash at acquisition time
  • Acquisition timestamp in UTC with timezone offset
  • Tool provenance (FTK Imager, Volatility, dd, AWS CloudTrail export)
  • Investigator identity
  • Transfer log (who had custody and when)

每个证据项必须记录:
  • 获取时的SHA-256哈希值
  • UTC时间戳及时区偏移
  • 工具来源(FTK Imager、Volatility、dd、AWS CloudTrail导出)
  • 调查人员身份
  • 转移日志(保管人及时间)

Escalation Paths

升级路径

By Severity

按严重等级

SeverityImmediate ContactBridge CallExternal Notification
SEV1SOC Lead + CISO (15 min)Immediate war roomLegal + PR standby; regulatory notification per deadline table
SEV2SOC Lead (30 min async)1-hour bridgeLegal notification if PII involved
SEV3Security Manager (4 hours)Async onlyNone unless scope expands
SEV4L3 Analyst queue (24 hours)NoneNone
严重等级立即联系人桥接会议外部通知
SEV1SOC主管 + CISO(15分钟内)立即启动作战室法务 + PR待命;按截止时间表进行监管通知
SEV2SOC主管(30分钟内异步)1小时桥接会议若涉及PII则通知法务
SEV3安全经理(4小时内)仅异步除非范围扩大,否则无需通知
SEV4L3分析师队列(24小时内)

By Incident Type

按事件类型

Incident TypePrimary EscalationSecondary
Ransomware / APTCISO + CEOBoard if data at risk
PII/PHI breachLegal + CISORegulatory body (per deadline table)
Cloud account compromiseCloud security teamCISO
Insider threatHR + Legal + CISOLaw enforcement if criminal
Supply chainCISO + Vendor managementBoard

事件类型主要升级对象次要升级对象
勒索软件 / APTCISO + CEO若数据面临风险则通知董事会
PII/PHI泄露法务 + CISO监管机构(按截止时间表)
云账户泄露云安全团队CISO
内部威胁HR + 法务 + CISO若涉及犯罪则通知执法部门
供应链攻击CISO + 供应商管理董事会

Regulatory Notification Obligations

监管通知义务

The notification clock starts at incident declaration, not at investigation completion.
FrameworkIncident TypeDeadlinePenalty
GDPR (EU 2016/679)Personal data breach72 hours after discoveryUp to 4% global revenue
PCI-DSS v4.0Cardholder data breach24 hours to acquirerCard brand fines
HIPAA (45 CFR 164)PHI breach (>500 individuals)60 days after discoveryUp to $1.9M per violation category
NY DFS 23 NYCRR 500Cybersecurity event72 hours to DFSRegulatory sanctions
SEC Rule (17 CFR 229.106)Material cybersecurity incident4 business days after materiality determinationSEC enforcement
CCPA / CPRABreach of sensitive PIWithout unreasonable delayAG enforcement; private right of action
NIS2 (EU 2022/2555)Significant incident (essential services)24-hour early warning; 72-hour notificationNational authority sanctions
Operational rule: If scope is unclear at declaration, assume the most restrictive applicable deadline and confirm scope within the first response window.
Full deadline reference:
references/regulatory-deadlines.md

通知时钟从事件宣布时开始计算,而非调查完成时。
框架事件类型截止时间处罚
GDPR (EU 2016/679)个人数据泄露发现后72小时最高全球收入的4%
PCI-DSS v4.0持卡人数据泄露24小时内通知收单机构卡品牌罚款
HIPAA (45 CFR 164)PHI泄露(>500人)发现后60天每类违规最高190万美元
NY DFS 23 NYCRR 500网络安全事件72小时内通知DFS监管制裁
SEC Rule (17 CFR 229.106)重大网络安全事件确定重大性后4个工作日SEC执法
CCPA / CPRA敏感个人信息泄露无不合理延迟总检察长执法;私人诉讼权
NIS2 (EU 2022/2555)重大事件(关键服务)24小时预警;72小时通知国家机构制裁
操作规则: 若事件宣布时范围不明确,假设适用最严格的截止时间,并在首个响应窗口内确认范围。
完整截止时间参考:
references/regulatory-deadlines.md

Workflows

工作流

Workflow 1: Quick Triage (15 Minutes)

工作流1:快速分诊(15分钟)

For single alert requiring classification before escalation decision:
bash
undefined
针对需先分类再决定是否升级的单个警报:
bash
undefined

1. Classify the event with false positive filtering

1. 启用误报过滤对事件进行分类

python3 scripts/incident_triage.py --input alert.json
--classify --false-positive-check --json
python3 scripts/incident_triage.py --input alert.json
--classify --false-positive-check --json

2. Review severity, escalation_path, and false_positive_flag in output

2. 查看输出中的severity、escalation_path和false_positive_flag字段

3. If severity = sev1 or sev2, page SOC Lead immediately

3. 若严重等级为sev1或sev2,立即通知SOC主管

4. If false_positive_flag = true, document and close

4. 若false_positive_flag为true,记录并关闭事件


**Decision**: Exit code 2 = SEV1 war room now. Exit code 1 = SEV2 bridge call within 30 minutes.

**决策**:退出码2 = 立即启动SEV1作战室。退出码1 = 30分钟内召开SEV2桥接会议。

Workflow 2: Full Incident Response (SEV1)

工作流2:完整事件响应(SEV1)

T+0   Detection arrives (SIEM alert, EDR, user report)
T+5   Classify with incident_triage.py --classify --false-positive-check
T+10  If SEV1: page CISO, open war room, start regulatory clock
T+15  Initiate forensic collection (volatile evidence first)
T+15  Containment assessment (parallel with forensics)
T+30  Human approval gate for any containment action
T+45  Execute approved containment
T+60  Assess containment effectiveness, brief Legal if PII/PHI scope
T+4h  Final forensic evidence package, dwell time estimate
T+8h  Eradication and recovery plan
T+72h Regulatory notification submission (if GDPR/NIS2 triggered)
bash
undefined
T+0   检测到事件(SIEM警报、EDR、用户报告)
T+5   使用incident_triage.py --classify --false-positive-check进行分类
T+10  若为SEV1:通知CISO,启动作战室,开始监管时钟
T+15  启动取证收集(优先收集易失性证据)
T+15  遏制评估(与取证并行)
T+30  任何遏制行动需经人工批准
T+45  执行已批准的遏制措施
T+60  评估遏制效果,若涉及PII/PHI范围则通知法务
T+4h  最终取证证据包,估算驻留时间
T+8h  根除和恢复计划
T+72h 提交监管通知(若触发GDPR/NIS2)
bash
undefined

Full classification with forensic context

结合取证上下文进行完整分类

python3 scripts/incident_triage.py --input incident.json
--classify --false-positive-check --severity sev1 --json > incident_triage_output.json
python3 scripts/incident_triage.py --input incident.json
--classify --false-positive-check --severity sev1 --json > incident_triage_output.json

Forensic pre-analysis

取证预分析

python3 scripts/incident_triage.py --input incident.json --json |
jq '.forensic_findings, .chain_of_custody_steps'
undefined
python3 scripts/incident_triage.py --input incident.json --json |
jq '.forensic_findings, .chain_of_custody_steps'
undefined

Workflow 3: Tabletop Exercise Simulation

工作流3:桌面演练模拟

Simulate incidents at specific severity levels without real events:
bash
undefined
在无真实事件的情况下模拟特定严重等级的事件:
bash
undefined

Simulate SEV1 ransomware incident

模拟SEV1勒索软件事件

echo '{"event_type": "ransomware", "host": "prod-db-01", "user": "svc_backup"}' |
python3 scripts/incident_triage.py --classify --severity sev1 --json
echo '{"event_type": "ransomware", "host": "prod-db-01", "user": "svc_backup"}' |
python3 scripts/incident_triage.py --classify --severity sev1 --json

Simulate SEV2 credential compromise

模拟SEV2凭证泄露事件

echo '{"event_type": "credential_compromise", "user": "admin_user", "source_ip": "203.0.113.5"}' |
python3 scripts/incident_triage.py --classify --false-positive-check --json
echo '{"event_type": "credential_compromise", "user": "admin_user", "source_ip": "203.0.113.5"}' |
python3 scripts/incident_triage.py --classify --false-positive-check --json

Verify escalation paths for all 14 incident types

验证所有14种事件类型的升级路径

for type in ransomware data_exfiltration credential_compromise lateral_movement; do echo "{"event_type": "$type"}" | python3 scripts/incident_triage.py --classify --json done

---
for type in ransomware data_exfiltration credential_compromise lateral_movement; do echo "{"event_type": "$type"}" | python3 scripts/incident_triage.py --classify --json done

---

Anti-Patterns

反模式

  1. Starting the notification clock at investigation completion — Regulatory clocks (GDPR 72 hours, PCI 24 hours) start at discovery, not investigation completion. Declaring late exposes the organization to maximum penalties even if the incident itself was minor.
  2. Containing before collecting volatile evidence — Rebooting or isolating a system destroys RAM, running processes, and active connections. Forensic collection of volatile evidence must happen in parallel with containment, never after.
  3. Skipping false positive verification before escalation — Escalating every alert to SEV1 degrades SOC credibility and causes alert fatigue. Always run false positive filters before paging the CISO.
  4. Undocumented incident command decisions — Every decision made during a SEV1, including decisions made under uncertainty, must be logged in the evidence chain with timestamp and rationale. Undocumented decisions cannot be defended in regulatory investigations.
  5. Treating incident closure as investigation completion — Incidents are closed when eradication and recovery are complete, not when the investigation is done. The forensic report and regulatory submissions may continue after operational closure.
  6. Single-source classification — Classifying an incident from a single data source (one SIEM alert) without corroborating evidence frequently leads to misclassification. Collect at least two independent signals before declaring SEV1.
  7. Bypassing human approval gates for containment — Automated containment actions (network isolation, credential revocation) taken without human approval can cause production outages, destroy evidence, and create liability. Human approval is non-negotiable for all mutating containment actions.

  1. 在调查完成后启动通知时钟——监管时钟(GDPR 72小时、PCI 24小时)从发现时开始计算,而非调查完成时。延迟宣布会使组织面临最高处罚,即使事件本身并不严重。
  2. 在收集易失性证据前进行遏制——重启或隔离系统会销毁RAM、运行进程和活跃连接。易失性证据的取证收集必须与遏制并行进行,绝不能在之后。
  3. 升级前跳过误报验证——将所有警报升级为SEV1会降低SOC可信度并导致警报疲劳。在通知CISO前必须始终运行误报过滤器。
  4. 未记录事件指挥决策——SEV1期间做出的每个决策,包括不确定情况下的决策,必须在证据链中记录时间戳和理由。未记录的决策无法在监管调查中辩护。
  5. 将事件关闭视为调查完成——事件在根除和恢复完成后关闭,而非调查完成时。取证报告和监管提交可能在业务关闭后继续进行。
  6. 单一来源分类——仅从单一数据源(一个SIEM警报)对事件进行分类,而无佐证证据,经常导致错误分类。宣布SEV1前至少收集两个独立信号。
  7. 绕过人工批准进行遏制——未经人工批准的自动遏制行动(网络隔离、凭证吊销)可能导致生产中断、销毁证据并产生责任。所有变更性遏制行动必须经过人工批准,这是不可协商的。

Cross-References

交叉引用

SkillRelationship
threat-detectionConfirmed hunting findings escalate to incident-response for triage and classification
cloud-securityCloud posture findings (IAM compromise, S3 exposure) may trigger incident classification
red-teamRed team findings validate detection coverage; confirmed gaps become hunting hypotheses
security-pen-testingPen test vulnerabilities exploited in the wild escalate to incident-response for active incident handling
技能关系
threat-detection确认的狩猎发现会升级至incident-response进行分诊和分类
cloud-security云态势发现(IAM泄露、S3暴露)可能触发事件分类
red-team红队发现验证检测覆盖范围;确认的漏洞成为狩猎假设
security-pen-testing渗透测试中发现的漏洞在野外被利用时,会升级至incident-response进行活跃事件处理