Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Incident Response

Incident Response (IR) is the structured process for detecting, containing, resolving, and following up on cybersecurity incidents. A well-prepared IR process determines the extent and duration of the damage caused by an attack.

Table of Contents (3 sections)

Incident Response (IR)—also known as incident response or emergency management—refers to all activities an organization undertakes when a cybersecurity incident is detected or suspected. The key factor distinguishing a minor incident from a crisis that threatens the organization’s survival is the quality of its preparedness.

According to the IBM Cost of a Data Breach Report 2024, companies with a well-developed IR plan incur average damage costs of $2.66 million per incident—compared to $5.37 million for companies without an IR plan. Statistically, the IR plan saves over $2.7 million per incident.

The PICERL Model

PICERL is the most widely used IR lifecycle model (according to SANS) and comprises six phases:

P - Preparation

The most important phase—it takes place before the incident. No preparation means chaos when the crisis hits.

Documentation & Planning:

  • IR Plan: Who does what, in what order, using which tools?
  • Runbooks/Playbooks: Scenario-specific step-by-step instructions (ransomware, data breach, account compromise)
  • Communication Matrix: Internal escalation paths, external contacts (BSI, BKA, data protection authority, law enforcement, insurance, lawyer, PR)
  • Crisis exercises: Tabletop exercises and technical simulations

Technical preparation:

  • SIEM with documented use cases and alert rules
  • Endpoint Detection & Response (EDR) on all systems
  • Centralized logging (retention for at least 12 months)
  • Offline backups with tested recovery procedures
  • Forensic readiness: blockers, write protectors, forensic imaging software

I - Identification

Detection and initial assessment of the incident. Common sources of detection:

  • SIEM alerts and SOC monitoring
  • EDR alerts (behavioral anomalies, malware detection)
  • Employee reports ("my computer is acting strangely")
  • External notifications (BSI CERT-Bund, ISAC partners, customers)
  • Ransomware notification on the screen (unfortunately, often only at this stage)

Critical initial questions:

  • What exactly happened? When was it discovered?
  • Which systems, users, and data are affected?
  • What is the current status of the attack? Is the attack still ongoing?
  • Is this a targeted or untargeted attack?

Classification: Not every security event is an incident. A clear classification matrix (severity levels 1–4 or P1–P4) prevents alarm fatigue and ensures that critical incidents are immediately given the appropriate priority.

C - Containment

Preventing further spread. Two strategies:

Short-Term Containment: Immediate measures that limit the damage but disrupt operations as little as possible:

  • Isolate the network segment (VLAN switch)
  • Lock affected accounts or reset passwords
  • Disable affected service
  • Do not shut down – volatile memory contains forensic evidence

Long-Term Containment: Stabilization measures while remediation is prepared:

  • Apply patches or activate workarounds
  • Increased monitoring on all systems
  • Harden exposed systems

Critical Point: Mistakes are often made in this phase—shutdowns that are too early or too extensive destroy forensic evidence and can unnecessarily interrupt business processes.

E - Eradication

Complete removal of the attacker and their tools. Typical measures:

  • Complete forensic analysis of compromised systems (malware search, IOC extraction)
  • Reinstallation of compromised systems (reimaging—cleaning alone is not sufficient for APTs)
  • Closing all known and probable entry points
  • Reset all compromised credentials—and more if in doubt
  • In case of AD compromise: Reset KRBTGT twice, perform forensic AD analysis

Common mistake: Eradication too early without a complete understanding of the scope of the attack—the attacker has backdoors that were not removed and will return.

R - Recovery

Return to normal operations - gradually, with increased monitoring.

Define recovery criteria: When can a system be considered "clean"? What criteria determine when a system is returned to production?

Prioritization: Restore critical business processes first. Determine the restoration order in advance via a Business Impact Analysis (BIA).

Increased Monitoring: Maintain heightened vigilance for at least 30–90 days following a major incident—attackers frequently return to known targets.

L - Lessons Learned (Follow-up)

The most frequently skipped phase, yet the most important for organizational development.

Post-Incident Review (within 2 weeks of incident resolution):

  • What happened? (Timeline)
  • How did the attacker gain initial access? Could it have been prevented?
  • What worked well? What didn’t?
  • Which detection rules are missing?
  • Which playbooks need to be created or improved?
  • What technical improvements are necessary?

Result: Updated IR plan, new SIEM use cases, concrete hardening measures with assigned responsibilities and deadlines.

Reporting Requirements in Germany

Certain incidents are subject to legal reporting requirements:

LawAffected PartiesDeadlineReporting Authority
GDPRAll companies handling personal data72 hoursState Data Protection Authority
NIS2 / BSIGKRITIS operators, critical infrastructure operators24-hour early warning, 72-hour notificationBSI
DORAFinancial institutions4-hour initial notification, 72-hour reportBaFin

Internal Team vs. External IR Service Provider

In-house IR capacity (recommended for ~200+ employees):

  • Advantages: Knowledge of the infrastructure, rapid availability, familiarity with business processes
  • Disadvantages: High costs for 24/7 on-call support, building expertise takes years

External IR retainer (recommended for SMEs): A pre-signed contract with an IR service provider guarantees priority availability in an emergency. Costs: typically €15,000–€40,000/year for a retainer contract that can be activated immediately in an emergency—significantly cheaper than an unplanned engagement during a crisis (€2,000–€5,000/day).

Further information: AWARE7 Incident Response Consulting

Sources & References

  1. [1] NIST SP 800-61r2 - Computer Security Incident Handling Guide - National Institute of Standards and Technology
  2. [2] BSI - IT-Grundschutz Baustein DER.2.1 Incident Management - Bundesamt für Sicherheit in der Informationstechnik
  3. [3] SANS Incident Handler's Handbook - SANS Institute

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Oskar Braun
Oskar Braun

Abteilungsleiter Information Security Consulting

E-Mail

Dipl.-Math. (WWU Münster) und Promovend am Promotionskolleg NRW (Hochschule Rhein-Waal) mit Forschungsschwerpunkt Phishing-Awareness, Behavioral Security und Nudging in der IT-Sicherheit. Verantwortet den Aufbau und die Pflege von ISMS, leitet interne Audits nach ISO/IEC 27001:2022 und berät als externer ISB in KRITIS-Branchen. Lehrbeauftragter für Communication Security an der Hochschule Rhein-Waal und NIS2-Schulungsleiter bei der isits AG.

ISO 27001 Lead Auditor (IRCA) ISB (TÜV)
This article was last edited on 03.03.2026. Responsible: Oskar Braun, Abteilungsleiter Information Security Consulting at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung