T+0Detection· SOC analyst · automated
EDR isolates first compromised endpoint
Defender for Endpoint blocks file-encryption pattern, isolates host from network. Initial alert fires in SOC console.
T+3 minDetection· SOC tier-2
SOC analyst opens incident, runs scope query
Identity, lateral-movement, and persistence indicators pulled from SIEM. Two additional endpoints flagged with matching IOCs.
T+8 minContainment· SOC tier-2 · IR lead
Containment: identity + endpoint quarantine
Compromised user revoked, sign-in sessions terminated. All three endpoints isolated. Lateral targets pre-emptively isolated.
T+15 minContainment· IR lead → Client CISO / Owner
Client notification + IR call bridge opened
Notification per pre-agreed SLA. Bridge opened with client lead, EFROS IR lead, and SOC on the line. Initial scope and impact statement delivered.
T+45 minInvestigation· DFIR engineer
Forensic acquisition + threat-actor identification
Memory image, disk snapshot, and log preservation. TTPs matched against known affiliate. Initial-access vector identified (phished M365 account, no MFA).
T+4 hrRecovery· Senior engineer + DFIR
Eradication + clean-rebuild starts on isolated VLAN
Confirmed-clean baseline images deployed to a quarantine VLAN. Patient zero credential rotated, app-password reset across affected services.
T+10 hrRecovery· Backup engineer
Restore from immutable backup, verified clean
Three-2-1 backup restored to clean infrastructure. Hash integrity verified, AV scan clean. User-facing systems back online on a watched VLAN.
T+48 hrReview· IR lead + Client
Post-incident review + hardening plan
Written report delivered: TTPs, IOCs, what worked, what didn't, mandatory hardening (MFA, Conditional Access, log retention). Lessons documented for tabletop.