From harness-claude
Guides rapid containment of security incidents following NIST SP 800-61: network isolation, credential rotation, evidence preservation, and escalation procedures. For detected breaches or IR planning.
npx claudepluginhub intense-visions/harness-engineering --plugin harness-claudeThis skill uses the workspace's default tool permissions.
> The first 60 minutes of a security incident determine whether the organization loses days
Executes incident response containment for active breaches: assesses scope, isolates endpoints via EDR, segments networks, revokes credentials to stop lateral movement.
Guides NIST SP 800-61 incident response: classify breaches, preserve evidence, analyze logs with Bash tools, contain threats, investigate IOCs, eradicate malware, recover systems.
Executes containment strategies for active security breaches using network segmentation, endpoint isolation, credential revocation, and access controls to halt lateral movement. For live incident response.
Share bugs, ideas, or general feedback.
The first 60 minutes of a security incident determine whether the organization loses days of data or months of data -- containment is not about fixing the vulnerability, it is about stopping the bleeding while preserving the evidence needed to understand what happened
The cost of a security incident scales directly with containment time. IBM's Cost of a Data Breach Report consistently shows that organizations that contain breaches within 30 days save over $1 million compared to those that take longer:
Follow the NIST SP 800-61 incident response lifecycle. The four phases are Preparation, Detection and Analysis, Containment Eradication and Recovery, and Post-Incident Activity. Each phase has specific objectives:
Execute the first 60 minutes with discipline. The initial response period is the most critical and the most prone to mistakes:
Apply the correct containment strategy for the incident type. Different incidents require different containment approaches:
Preserve evidence before remediation. Evidence preservation is not optional -- it is required for understanding the full scope of the incident, for potential legal proceedings, and for improving defenses:
Establish and follow the communication plan. Incident communication is as critical as technical containment:
Severity classification framework in depth: P1 (Critical) -- active data exfiltration, destructive attack in progress, complete compromise of authentication infrastructure, or ransomware actively spreading. Response SLA: immediate, all-hands. P2 (High) -- confirmed attacker presence in the environment (e.g., backdoor found, unauthorized access to sensitive systems) but no evidence of active exfiltration or destruction. Response SLA: 1 hour. P3 (Medium) -- exploitable vulnerability discovered in production, credential exposure (e.g., secrets committed to a public repository), or phishing campaign targeting employees. Response SLA: 4 hours. P4 (Low) -- suspicious activity requiring investigation, security tool alert of uncertain significance, or minor policy violation. Response SLA: next business day.
Network isolation techniques: Security group modification is the fastest cloud-native isolation method -- modify the instance's security group to deny all inbound and outbound traffic except from a designated forensics jump host. VLAN isolation moves the compromised system to an isolated network segment. DNS sinkholing redirects the attacker's command-and- control domain to a controlled IP address, severing the C2 channel without alerting the attacker that they have been detected. Each technique has trade-offs between speed of implementation, evidence preservation, and attacker awareness.
Credential rotation scope and sequencing: When a system is compromised, assume all credentials accessible from that system are compromised. This includes: service account passwords, API keys in environment variables or configuration files, database connection strings, TLS private keys, SSH keys, and any secrets in the process's memory. Rotate in order of blast radius: domain admin credentials first, then service accounts with broad access, then application-specific credentials. Monitor for the rotated credentials being used after rotation -- this indicates the attacker has a persistence mechanism that captures new credentials.
Rebooting the compromised system. The instinct to "restart and see if it fixes it" destroys volatile evidence: memory contents, network connections, running processes, and cached credentials. Memory forensics can reveal the attacker's tools, their command-and- control infrastructure, and what data they accessed. Reboot only after memory and disk have been imaged.
Immediately patching without understanding the full scope. Patching the exploited vulnerability on the compromised system does not remove the attacker -- they likely established persistence mechanisms (backdoor accounts, scheduled tasks, web shells, modified binaries) on the compromised system and may have moved laterally to other systems. Patching gives a false sense of security while the attacker maintains access through their other footholds.
No predefined incident response plan. Every incident becomes ad-hoc. The team wastes the critical first hour deciding who should do what, what tools to use, and who to notify. Decisions made under pressure without a plan are consistently worse than decisions made calmly during preparation. Conduct tabletop exercises quarterly and update runbooks based on lessons learned.
Single point of failure in the response team. Only one person knows the runbooks, has access to the forensics tools, or can authorize containment actions. If that person is unavailable (vacation, sick, different time zone), the response is paralyzed. Cross-train at least two people for every critical response role.
Notification delays. Delaying breach notification to avoid bad press or in hopes that the incident turns out to be less severe than feared. GDPR mandates 72-hour notification to the supervisory authority. Delayed notification increases legal liability, regulatory fines, and reputational damage when the delay becomes public. Start the notification clock at the moment of awareness and communicate factually about what is known and unknown.