In the last chapter, you learned about the three pillars that sustained your security posture, and two of them (detection and response) are directly correlated with the Incident Response (IR) process. To enhance the foundation of your security posture, you need to have a solid incident response process. This process will dictate how to handle security incidents and rapidly respond to them. Many companies do have an incident response process in place, but they fail to constantly review it to incorporate lessons learned from previous incidents, and on top of that, many are not prepared to handle security incidents in a cloud environment.
In this chapter, we're going to be covering the following topics:
- The incident response process
- Handling an incident
- Post-incident activity