Many incident response failures don’t come from an absence of instruments, intelligence, or technical expertise. They arrive from what occurs instantly after detection, when strain is excessive, and data is incomplete.
I’ve seen IR groups recuperate from subtle intrusions with restricted telemetry. I’ve additionally seen groups lose management of investigations they need to have been in a position to deal with. The distinction often seems early. Not hours later, when timelines are constructed, or reviews are written, however within the first moments after a responder realizes one thing is mistaken.
These early moments are sometimes described as the primary 90 seconds. Nonetheless, taken too actually, that framing misses the purpose. This isn’t about reacting quicker than an attacker or speeding to motion. It’s about establishing route earlier than assumptions harden and choices disappear.
Responders make quiet choices immediately, like what to have a look at first, what to protect, and whether or not to deal with the difficulty as a single system downside or the start of a bigger sample. As soon as these early choices are made, they form every thing that follows. Understanding why these decisions matter (and getting them proper) requires rethinking what the “first 90 seconds” of an actual investigation represents.
The First 90 Seconds Are a Sample, Not a Second
One of the crucial frequent errors I see is treating the opening part of an investigation as a single, dramatic occasion. The alert fires, the clock begins, and responders both deal with it effectively or they don’t. That isn’t how actual incidents unfold.
The “first 90 seconds” occurs each time the scope of an intrusion modifications.
You’re notified a few system believed to be concerned in an intrusion. You entry it. You resolve what issues, what to protect, and what this method would possibly reveal about the remainder of the atmosphere. That very same resolution window opens once more once you establish a second system, then a 3rd. Each resets the clock.
That is the place groups typically really feel overwhelmed. They take a look at the scale of their atmosphere and assume they’re going through tons of or hundreds of machines directly. In actuality, they’re going through a a lot smaller set of methods at a time. Scope grows incrementally. One machine results in one other, then one other, till a sample begins to emerge.
Sturdy responders don’t reinvent their method every time that occurs. They apply the identical early self-discipline each time they contact a brand new system. What was executed right here? When did it execute? What occurred round it? Who or what interacted with it? That consistency is what permits scope to develop with out management being misplaced.
That is additionally why early choices matter a lot. If responders deal with the primary affected system as an remoted downside and rush to “repair” it, they shut a ticket as a substitute of investigating an intrusion. In the event that they fail to protect the precise artifacts early, they spend the remainder of the investigation guessing. These errors can compound because the scope expands.
How Investigations are Hindered
When early investigations go mistaken, it’s tempting guilty coaching, hesitation, or poor communication. These points do present up, however they’re often signs, not root causes. The extra constant failure is that groups don’t perceive their very own atmosphere effectively sufficient when the incident begins.
Responders are compelled to reply fundamental questions beneath strain. The place does information go away the community? What logging exists on vital methods? How far again does the information go? Was it preserved or overwritten? These questions ought to have already got solutions. When they don’t, responders find yourself studying the vital elements of their atmosphere after it’s too late.
That is why logging that begins following a detection is so damaging. Ahead visibility with out backward context limits what will be confirmed. You should still reconstruct elements of the assault, however each conclusion turns into weaker. Gaps flip into assumptions, and assumptions flip into errors.
One other frequent failure is proof prioritization. Early on, every thing feels necessary, so groups leap between artifacts and not using a clear anchor. That creates exercise with out progress. In most investigations, the quickest approach to regain readability is to give attention to proof of execution. Nothing significant occurs on a system with out one thing operating. Malware executes. PowerShell runs. Native instruments get abused. Dwelling off the land nonetheless leaves traces. Should you perceive what was executed and when, you can begin to know intent, entry, and motion.
From there, context issues. That would imply what system was accessed round that point, who linked to the system, or the place the exercise moved subsequent. These solutions don’t exist in isolation. They type a series, and that chain factors outward into the atmosphere.
The ultimate failure is untimely closure. Within the curiosity of time, groups typically reimage a system, restore providers, and transfer on. Besides that incomplete investigations can go away behind small, unnoticed items of entry. Secondary implants. Alternate credentials. Quiet persistence. A refined indicator of compromise doesn’t at all times reignite instantly, which creates the phantasm of success. If it does resurface, the incident feels new when, in actuality, it isn’t. It’s the identical one which was by no means totally remediated.
Be a part of us at SANS DC Metro 2026
Groups that may get the opening moments proper allow tough investigations to grow to be extra manageable. Efficient incident response is about self-discipline beneath uncertainty, utilized the identical manner each time a brand new intrusion comes into scope. Nonetheless, you will need to give your self grace. Nobody begins out good at this. Each responder you belief in the present day realized by making errors, then studying how to not repeat them the following time.
The objective is to not keep away from incidents totally. That’s unrealistic. The objective is to keep away from making repetitive errors beneath stress. That solely occurs when groups are ready earlier than an incident forces the difficulty. As a result of once they perceive their environments, they will observe figuring out execution, preserving proof, and increasing scope intentionally whereas the stakes are nonetheless low.
When investigations are dealt with with that stage of self-discipline, the primary 90 seconds really feel acquainted fairly than frantic. The identical questions get requested, and the identical priorities information the work. That consistency is what permits groups to maneuver quicker later, with confidence as a substitute of guesswork.
For responders who expertise these challenges in their very own investigations, that is precisely the mindset and methodology taught in our SANS FOR508: Superior Incident Response, Menace Looking, and Digital Forensics class. I shall be instructing FOR508 at SANS DC Metro on March 2-7, 2026, for groups that wish to observe this self-discipline and switch insights into motion.
Word: This text has been expertly written and contributed by Eric Zimmerman, Principal Teacher at SANS Institute.

