HYM

security x life

Security & Life Log

02 // SKILL FOLDER

Security Analysis

Threat modeling, log triage, incident response and evidence-chain notes.

Threat modelingLog analysisIncident response

Articles

Log triage checklist

A reusable checklist for common investigation workflows.

Log triage checklist

1. Define the time window. 2. Identify critical assets. 3. Correlate accounts, IPs, processes and file paths. 4. Preserve the evidence chain.