Security builder & leader

The Big Picture of the Security Incident Cycle

Incident response doesn't exist in isolation—it connects with intrusion detection, penetration testing, application security, and network defense through a four-phase cycle: Plan, Resist, Detect, and Respond. Many organizations fail by over-investing in one phase while neglecting how these phases interconnect.

What is the relation of incident response (IR) to other information security disciplines, such as intrusion detection, penetration testing, application security and network defense? These teams operate as part of an overall incident cycle that ties disparate security specialists together. The cycle consists of 4 major phases: Plan, Resist, Detect and Respond. Let’s take a look at the cycle and explore ways in which organizations often fail at navigating it.

The Security Incident Cycle Flow

Speaking at the US Digital Forensic and Incident Response Summit 2010, Richard Bejtlich discussed the topic of CIRT-Level Response to Advanced Persistent Threat. His talk focused on the unique challenges of handling APT incidents that span years, not days. The presentation (PDF) included a slide that outlined the structure of the Computer Incident Response Team (CIRT) group that Richard built at General Electric to support the security incident cycle. I’ll refer to this diagram; however, my interpretation might differ from that of Richard, as I do not recall the specific details he shared with the audience when discussing this slide.

Security Incident Cycle: Plan, Resist, Detect and Respond

Phases of the Security Incident Cycle

Your ability to navigate the security incident cycle is critical to the success of your data protection efforts. Let’s take a quick look at the phases of the cycle:

Failures Navigating the Security Incident Cycle

Too often, organizations focus on only one phase of the security incident cycle, without recognizing that each phase is part of a larger circle. Let’s look at some of these failures:

Do you work at one of these organizations? If so, what can you do to begin looking at security incidents as part of a larger Plan, Resist, Detect and Respond cycle? Perhaps that’s a topic for another post. In the meantime, I’d love to hear your thoughts in comments.

About the Author

Lenny Zeltser is a cybersecurity executive with deep technical roots, product management experience, and a business mindset. As CISO at Axonius, he leads the security and IT program, focusing on trust and growth. He is also a Faculty Fellow at SANS Institute and the creator of REMnux, a popular Linux toolkit for malware analysis. Lenny shares his perspectives on security leadership and technology at zeltser.com.

Learn more →