Practice and strategy · Module 6

Detection and incident response

Detection closes the gap between compromise and action.

1.5h 3 outcomes Cybersecurity Practice and Strategy

Previously

Vulnerability management

Vulnerability management is not a panic feed.

This module

Detection and incident response

Detection closes the gap between compromise and action.

Next

Privacy, ethics, and auditability

This section is the glue.

Progress

Mark this module complete when you can explain it without rereading every paragraph.

Why this matters

Before the tools, agree on the decision you are practising.

What you will be able to do

  • 1 Explain the detection and response loop and who owns each step
  • 2 Build a timeline that supports scope and containment decisions
  • 3 Tune detections with an explicit trade off between noise and misses

Before you begin

  • You understand what logs are and why time matters

Common ways people get this wrong

  • Panic response. Rushing creates more harm. A rehearsed sequence prevents chaos.
  • Over-containment. Containment that breaks the business can be its own incident. Choose proportional actions.

Main idea at a glance

From events to action

Systems emit events → SIEM rules → alerts → analyst follows a playbook.

Detection to response operating loop

`flowchart LR
Sources["System &\napp logs"] --> Pipeline["Log pipeline\n& normalise"]
Pipeline --> Correlation["SIEM rules\n& analytics"]
Correlation --> Alert["Prioritised\nalert"]
Alert --> Analyst["Analyst\ntriage"]
Analyst --> Contain["Contain &\nrespond"]
Contain --> Recover["Recover\nservices"]
Recover --> Lessons["Lessons &\nrule tuning"]
Lessons --> Correlation
`

Detection to response operating loop

Detection closes the gap between compromise and action. A SIEM feeds alerts to a SOC. Good detection reduces dwell time. Response follows a loop. Triage, contain, eradicate, recover, and learn.

Why this exists. Prevention fails. Detection and response are how you limit business impact when you have a bad day. This is also where trust gets rebuilt. Customers do not need perfection, but they do need competent, transparent handling.

Who owns it. SOC and incident response teams own day to day triage and response. Engineering owns fix and deploy. IT owns endpoint actions. Security leadership owns priorities, playbooks, and escalation rules. Leadership and legal often co own external communication and reporting decisions. Third parties frequently own part of the telemetry and response actions.

Trade offs. More detection rules can mean more noise. Aggressive thresholds catch more, but can burn analysts out and lead to missed real incidents due to alert fatigue. Heavy containment can protect systems, but can also take critical services offline. Good programmes balance risk reduction with operational sustainability.

Failure modes. Collecting logs without being able to answer questions from them. Treating a SIEM as a product purchase rather than an operating model. No clear owner for response decisions, no tested playbooks, and no authority to contain when it hurts.

Maturity thinking. Basic looks like centralised logging, MFA for admin, and a minimal set of high value detections. Good looks like playbooks, on call rotation, regular tabletop exercises, and tuning based on real incidents. Excellent looks like measured time to detect and time to contain, cross team drills, and a learning loop where fixes land fast.

Threat hunting is proactive. Forming a hypothesis and looking for weak signals before an alert fires. In some platforms you will see UEBA (user and entity behaviour analytics), which is basically pattern detection over behaviour. Use it, but do not worship it. Playbooks standardise common steps. Tabletop exercises build muscle memory.

Before the tools, agree on the decision you are practising. Are you prioritising speed of containment over service availability. Are you building evidence for a regulator. Are you deciding whether this is an incident or just a weird Tuesday.

Afterwards, interpret like an investigator and like a leader. The timeline is not just for curiosity. It drives scope, impact, and next actions. It also affects evidence quality. Can you show who did what, when, and from where, in a way that would stand up in a review.

After you run it, document the judgement. Which signals are mandatory, which are optional, and who owns them. Then turn it into an operating rule. Who can change detections, how changes are reviewed, and what you monitor to detect drift.

Mental model

Detect to recover

Incident response is a sequence: detect, contain, recover, learn.

  1. 1

    Detect

  2. 2

    Contain

  3. 3

    Recover

  4. 4

    Learn

Assumptions to keep in mind

  • Roles are clear. If nobody is on point, response becomes a meeting. Roles create speed and calm.
  • Evidence is captured early. Change destroys evidence. Capture what you need before you fix.

Failure modes to notice

  • Panic response. Rushing creates more harm. A rehearsed sequence prevents chaos.
  • Over-containment. Containment that breaks the business can be its own incident. Choose proportional actions.

Key terms

SIEM
Security information and event management (SIEM), a platform that collects and correlates security events
SOC
security operations centre (SOC), a team that monitors and responds
dwell time
how long an attacker stays unnoticed

Check yourself

Quick check. Detection and response

0 of 7 opened

Scenario. Your SIEM fires constantly and nobody trusts it. What should you do

Reduce noise. Tune rules, add context, tie alerts to playbooks and owners, and prioritise a small set of high value detections first.

What does a SIEM do

Collects and correlates events to surface potential security issues.

Why does dwell time matter

The longer an attacker remains undetected, the more damage they can do.

What is the usual response flow

Triage, contain, eradicate, recover, then learn and improve.

What is threat hunting

Proactively searching for weak signals of attack before alerts fire.

Why use playbooks

To make response consistent and faster under pressure.

Name one valuable log source

Authentication and authorisation events, or admin actions on critical systems.

Artefact and reflection

Artefact

An incident timeline and a short playbook excerpt

Reflection

Where in your work would explain the detection and response loop and who owns each step change a decision, and what evidence would make you trust that change?

Optional practice

Arrange log events into a timeline and practise telling the story of what happened and when.

Also in this module

Map detection coverage

Map attacks to signals and aim for at least two signals per attack stage.

Source NIST Cybersecurity Framework (CSF) 2.0 (2024)
Source OWASP Top 10 (2025)
Source OWASP ASVS 5.0.0
Source ISO/IEC 27001:2022 Information security management systems