Incident Response — Study Guide
Review these materials before taking the exam. All links open in the Krumware Confluence IO space.
Key Concepts
- When in doubt, report it. False alarms are fine. Hidden incidents are not.
- Severity levels: Critical (Sev 1) — confirmed breach; Major (Sev 2) — significant event; Minor (Sev 3) — limited impact; Informational (Sev 4) — worth documenting.
- You don't determine severity. Just report what you see — the response team classifies it.
- Reporting order: Slack (primary) → Email (secondary) → Phone (critical).
- What to include: What happened, when, what systems/data affected, actions taken, how to reach you.
- What NOT to do: Don't investigate, don't fix it yourself, don't wait, don't hide it, don't forward phishing, don't post on social media.
- No punishment for reporting. There are consequences for hiding incidents.
- Post-incident reviews are blameless — focused on learning, not punishment.
Playbooks
These are response team references. You don't need to memorize them, but knowing they exist helps you understand the process.