Skip to content

Samriddhi5/incident-response-playbooks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

11 Commits
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ›ก๏ธ Incident Response Playbooks

This repository contains structured and actionable security incident response playbooks developed for realistic scenarios in modern enterprise environments. Each playbook outlines key roles, tools, procedures, and post-incident activities based on NIST 800-61 standards and blue team best practices.


๐Ÿ“š Contents

1. ๐Ÿ“ playbooks/

Incident Type Description
๐Ÿงท Hashed Passwords Theft Response plan for stolen backup tapes containing sensitive hashed passwords (/etc/passwd, /etc/shadow). Focuses on containment, forensics, and recovery in Linux environments.
๐Ÿ“ก Rogue Wireless Access Point Incident response for unauthorized AP detected within a corporate office. Covers identification, physical and network containment, and mitigation against lateral movement.

2. ๐Ÿงฐ templates/

  • HashedPasswords_Incident_Report.md
  • RogueWiFiAP_Incident_Report.md

๐Ÿ› ๏ธ Tools & Technologies Referenced

  • ๐Ÿ” SIEM: IBM QRadar
  • ๐Ÿšฆ EDR: Symantec Endpoint Protection
  • ๐ŸŒ IDS/IPS: Suricata
  • ๐Ÿ” Encryption: BitLocker
  • ๐Ÿ”ฌ Forensics: EnCase, FTK, Autopsy
  • ๐Ÿ”ง Vulnerability Management: Tenable Nessus
  • ๐Ÿงฑ Firewall: Fortinet FortiGate
  • โ˜๏ธ Communication: Microsoft Teams, Outlook

๐Ÿ” Use Case

These playbooks can be used by:

  • Security teams to improve readiness
  • IR tabletop exercises
  • SOC analysts onboarding material
  • Security engineering process documentation

โœ๏ธ Author

Samriddhi
Threat Detection Enthusiast
LinkedIn


โ€œPreparedness is not just about having tools โ€” itโ€™s about having a plan to use them when it matters most.โ€

About

Incident response playbooks and templates for real-world security scenarios

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published