File tree Expand file tree Collapse file tree 1 file changed +35
-0
lines changed
Expand file tree Collapse file tree 1 file changed +35
-0
lines changed Original file line number Diff line number Diff line change 1+ # DFIR Methodology Overview
2+
3+ This file summarizes the digital forensics and incident response workflow.
4+
5+ ## Core Stages
6+
7+ ### 1. Preparation
8+ - Playbooks
9+ - Evidence handling SOPs
10+ - Logging configuration
11+
12+ ### 2. Identification
13+ - Alert triage
14+ - Scoping the incident
15+
16+ ### 3. Containment
17+ - Isolate host
18+ - Block indicators
19+ - Preserve volatile state
20+
21+ ### 4. Eradication
22+ - Remove malware
23+ - Patch exploited vulnerabilities
24+
25+ ### 5. Recovery
26+ - Restore from backups
27+ - Re-enable services
28+
29+ ### 6. Lessons Learned
30+ - Root cause analysis
31+ - Documentation updates
32+ - Detection improvement
33+
34+ ## Notes
35+ This workflow aligns with NIST SP 800-61r2 and common IR frameworks.
You can’t perform that action at this time.
0 commit comments