- Security Incident
- Any event that compromises β or has the potential to compromise β the confidentiality, integrity, or availability of an organization's information or systems.
- Incident Classification
- A tiered rating system (e.g., Low, Medium, High, Critical) that determines the severity of an incident and dictates the speed and level of the required response.
- Incident Response Team (IRT)
- The designated group of individuals responsible for executing the security response plan, typically including IT, security, legal, communications, and leadership representatives.
- Triage
- The initial assessment step where a reported event is evaluated to determine whether it qualifies as a real security incident and what classification it warrants.
- Containment
- Actions taken to limit the spread or impact of an active incident β such as isolating affected systems, revoking credentials, or blocking network segments.
- Eradication
- The process of identifying and removing the root cause of an incident from affected systems, including malware removal, patching vulnerabilities, and closing access vectors.
- Chain of Custody
- A documented record of who collected, handled, and transferred evidence from an incident β required if the matter may involve law enforcement or litigation.
- Mean Time to Detect (MTTD)
- The average time elapsed between a security incident occurring and the organization becoming aware of it β a key metric for evaluating detection capability.
- Mean Time to Respond (MTTR)
- The average time from incident detection to full containment and resolution β used to measure and benchmark the effectiveness of the response plan.
- Post-Incident Review (PIR)
- A structured debrief conducted after an incident is closed to identify what worked, what failed, and what process or technical changes should be made to prevent recurrence.
- Indicators of Compromise (IOCs)
- Observable artifacts β such as unusual IP addresses, file hashes, or login anomalies β that indicate a system may have been breached or is under attack.