All 6 PICERL phases in correct order with clear boundaries
The containment vs. eradication boundary — where candidates lose points
Evidence preservation and forensic chain of custody requirements
Post-incident review timing and Lessons Learned deliverables
207
Average days to identify a breach (IBM 2024)
4.9M
Average cost of a data breach (USD 2024)
14
Days: target window for Lessons Learned review
Preparation is the only phase that occurs BEFORE the actual incident. Everything else is reactive.

PICERL: The Lifecycle of a Breach

Incident Response is a highly structured discipline. The CompTIA SY0-701 tests heavily on which specific actions belong to which phase. Getting one action assigned to the wrong phase is a common and expensive mistake.

1
Phase 1: Preparation
Everything built BEFORE an incident occurs. Deliverables: Incident Response Plan (IRP), tabletop exercises, runbooks, configured SIEM alerting, defined communication trees. The only purely proactive phase.
2
Phase 2: Identification
Detecting that an incident is actually occurring and validating it is not a false positive. SIEM alerts fire, analyst investigates logs, correlates IOCs, and makes the determination to trigger the IRP.
3
Phase 3: Containment
Stop the bleeding. Prevent the threat from spreading while preserving forensic evidence. Short-term: disconnect infected host from the network (pull cable — do NOT power off). Long-term: rebuild unaffected systems, apply temporary firewall blocks.
4
Phase 4: Eradication
Remove the threat entirely. Delete malware artifacts, close backdoors, patch the exploited vulnerability, disable compromised accounts. Root cause analysis is performed here.
5
Phase 5: Recovery
Restore systems to verified, known-good operation. Restore from clean backups, force organization-wide password resets, monitor intensely for 30-90 days for signs of reinfection.
6
Phase 6: Lessons Learned
Post-Incident Review within 14 days. Review what went wrong, what went right, root cause. Update the IRP, add new SIEM detection rules. Output feeds directly back into Preparation.
Exam Trap: Do NOT wipe or reimage an infected server immediately. First disconnect it (Containment) and create a forensic disk image for evidence before Eradication. Wiping destroys chain of custody.

Common Phase Assignment Errors

ActionWrong Phase (Common Mistake)Correct Phase
Disconnecting infected server's ethernet cableIdentification or EradicationContainment
Patching the vulnerability the attacker exploitedRecoveryEradication
Identifying the root cause of the breachLessons LearnedEradication
Restoring database from clean backupEradicationRecovery
Writing an Incident Response playbookLessons LearnedPreparation
Reviewing SIEM alerts to confirm the incident is realContainmentIdentification
Post-incident review with Root Cause Analysis reportRecoveryLessons Learned

Real-World Scenario

A ransomware alert fires at 3 AM. Analyst confirms it is real (Identification). Immediately isolates infected servers by disabling switch ports — NOT powering off (Containment). Images drives forensically, then wipes and restores from last night's clean backup (Eradication + Recovery). Two weeks later, team holds a blameless post-mortem and updates the IRP with new ransomware-specific playbooks (Lessons Learned).

terminal
# Evidence preservation before eradication
virsh domif-setlink infected_vm vnet0 down  # Network containment
dd if=/dev/sda of=/forensics/disk.img bs=4M  # Forensic image
sha256sum /forensics/disk.img > disk.sha256   # Hash for chain of custody
When asked about when you patch the exploited vulnerability, the answer is 'Eradication' — not Recovery. When asked about updating the IRP or policies, the answer is always 'Lessons Learned.'
  • Preparation is the ONLY pre-incident phase — all others are reactive post-incident.
  • Containment = stop the spread and preserve evidence. Do NOT delete anything during Containment.
  • Eradication = remove the threat AND identify root cause. Patch the vulnerability here.
  • Recovery = restore from clean backups, monitor, return to production incrementally.
  • Lessons Learned must occur within 14 days — output feeds back into Preparation.

Ready to test your knowledge?

Take a free full-length practice exam with 90 questions and instant feedback.

Start Practice Exam