APT / Nation-State Intrusion Investigation Assessment

Assessment template for advanced persistent threat investigations covering TTP profiling, volatile evidence preservation, dwell-time hunting, assume-breach identity reset, and intelligence sharing.

Investigation Completion
0/25 checkpoints0 in progress
0%
Triage
0/4
Containment
0/3
Preservation
0/4
Collection
0/2
Analysis
0/3
Eradication
0/4
Recovery
0/2
Post-Incident Review
0/3

Triage

0/4
Investigation Timeframe Boundedcritical

Confirm that the investigation window has been defined with clear T-start (earliest known indicator) and T-end boundaries. The timeframe should include a safety buffer of at least 48 hours before the first detected IOC to account for pre-compromise reconnaissance.

Without a bounded timeframe, investigation scope creep will waste resources and delay containment
Patient Zero Identifiedcritical

Verify that the initially compromised system, account, or entry point has been identified and documented. Patient zero determination should be supported by corroborating evidence from multiple log sources such as EDR, authentication logs, and email gateway records.

Cannot determine full blast radius without identifying the initial compromise point
Severity Classifiedhigh

Ensure the incident has been assigned a severity level based on observed impact, affected asset criticality, and potential data exposure. The classification should follow the organization's incident severity matrix and be reflected in all communications and ticket metadata.

TTP Profile Built Against MITRE ATT&CKhigh

Confirm that observed techniques have been enumerated against MITRE ATT&CK tactics and 3-5 candidate threat groups have been identified based on tradecraft match. Attribution confidence is documented with supporting evidence.

Containment

0/3
Compromised Systems Isolatedcritical

Confirm that all systems identified as compromised have been isolated from the network. Isolation should be verified through network-level controls (VLAN segmentation, firewall rules, or EDR network quarantine) rather than simply disabling accounts on the host.

Active threat spread continues unchecked, increasing damage and recovery cost
Compromised Accounts Lockedcritical

Verify that all accounts known or suspected to be compromised have been disabled or had their credentials forcibly rotated. This includes service accounts, shared accounts, and any accounts with elevated privileges that the attacker may have accessed.

Attacker retains access to execute further actions using compromised credentials
Containment Scope Validatedhigh

Assess whether the containment boundary is comprehensive enough to cover all known attacker footholds. Review lateral movement evidence, C2 communication logs, and authentication patterns to confirm no alternate access paths remain outside the containment perimeter.

Preservation

0/4
Volatile Memory Capturedcritical

Confirm that volatile memory (RAM) has been captured from all key compromised systems before any reboot or remediation action. Memory dumps should be acquired using forensically-sound tools and stored with proper chain of custody documentation.

Memory evidence lost permanently on reboot — active processes, encryption keys, network connections gone
Critical Logs Snapshottedcritical

Verify that all critical log sources have been snapshotted or exported to a tamper-proof location. This includes SIEM data, Windows Event Logs, authentication logs, email gateway logs, and cloud audit trails that fall within the investigation timeframe.

Log rotation or attacker clearing may destroy critical timeline evidence
Chain of Custody Documentedhigh

Ensure that a formal chain of custody record exists for every piece of evidence collected. Each record must include the evidence hash, collector identity, collection timestamp, storage location, and any transfers between custodians.

Volatile Evidence Preserved Before Containmentcritical

Confirm memory captures and active-network-connection snapshots have been taken on suspected-compromised hosts before any containment action. APT tooling often lives in memory; rushed containment destroys evidence that is hard to recreate.

Lost volatile evidence makes subsequent attribution and capability analysis significantly harder

Collection

0/2
EDR Telemetry Collectedhigh

Confirm that endpoint detection and response telemetry has been collected from all in-scope systems for the investigation timeframe. Telemetry should include process execution trees, file modifications, network connections, and registry changes.

All Relevant Log Sources Collectedhigh

Validate that evidence has been gathered from every relevant log source including EDR, SIEM, cloud audit logs, email gateway, proxy, DNS, VPN, and authentication systems. Cross-reference the log source inventory against the incident scope to identify any gaps.

Analysis

0/3
Lateral Movement Mappedhigh

Verify that all lateral movement activity has been identified and mapped across the environment. Analysis should cover RDP sessions, SMB connections, WMI/PSRemoting, pass-the-hash/pass-the-ticket activity, and any anomalous authentication patterns between systems.

Root Cause Determinedcritical

Confirm that the root cause of the incident has been identified, including the initial attack vector, any exploited vulnerabilities, and the conditions that allowed the compromise to succeed. The root cause should be documented with supporting evidence from forensic analysis.

Without root cause, the same attack vector remains open for re-compromise
Investigation Window Extended to Retention Limithigh

Confirm that the investigation window has been extended to the full retention of each log source. Retention gaps shorter than suspected dwell are documented with a recovery plan (backup, SIEM cold storage, provider escalation).

Eradication

0/4
Malware & Tools Removedcritical

Confirm that all attacker-deployed malware, scripts, remote access tools, and utilities have been identified and removed from every affected system. Removal should be validated through post-remediation scans and manual verification of common persistence locations.

Residual malware enables attacker to regain access after recovery
Persistence Mechanisms Clearedcritical

Verify that all attacker persistence mechanisms have been identified and removed. This includes scheduled tasks, registry run keys, startup folder entries, WMI subscriptions, service installations, DLL hijacks, and any modified Group Policy Objects.

Persistence mechanisms survive system cleanup and enable long-term re-access
Credentials Resetcritical

Ensure that all credentials known or suspected to be compromised have been reset, including user passwords, service account passwords, API keys, certificates, and Kerberos tickets. The KRBTGT account should be reset twice if domain compromise is suspected.

Stolen credentials remain valid and allow attacker to re-enter the environment
Assume-Breach Identity Reset Executedcritical

Verify that a full identity reset has been executed: double krbtgt rotation, service-account rotation, domain-admin and Entra ID global-admin reset, organization-wide refresh-token revocation, and rebuild of confirmed-compromised systems.

Surgical cleanup without identity-store reset is the top cause of APT re-compromise within weeks

Recovery

0/2
Systems Rebuilt from Clean Baselinehigh

Confirm that compromised systems have been rebuilt from known-clean images or installation media rather than simply cleaned in place. The rebuild process should include verifying the integrity of the baseline image and applying all current security patches before reconnecting to the network.

Services Validated & Restoredhigh

Verify that business services have been restored in a controlled, phased manner with validation at each step. Service restoration should include functional testing, security monitoring confirmation, and a defined rollback plan if anomalous activity is detected post-restoration.

Post-Incident Review

0/3
Lessons Learned Documentedmedium

Confirm that a formal lessons-learned review has been conducted with all participating teams. The review should document what worked well, what failed, timeline gaps, tooling shortcomings, and specific improvement actions with assigned owners and deadlines.

Detection Rules Improvedmedium

Verify that detection rules, SIEM correlations, and EDR policies have been updated based on the TTPs observed during the incident. New detections should cover the initial access vector, lateral movement techniques, and any persistence mechanisms used by the attacker.

Threat Intelligence Shared with Peersmedium

Confirm that redacted IoCs, TTPs, and detection content have been shared through appropriate channels (ISAC, national CSIRT, vendor partners). Classification review has been done to ensure no internal identifiers leak.