NIST Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide, August 2012.
Section 3.1 (Introduction): Figure 3-1 "Incident Response Life Cycle" illustrates the cyclic nature but distinct phases: Preparation -> Detection & Analysis (Identification) -> Containment, Eradication, & Recovery -> Post-Incident Activity.
Section 3.2: Details "Preparation".
Section 3.3: Details "Detection and Analysis".
Section 3.4: Details "Containment, Eradication, and Recovery".
Section 3.5: Details "Post-Incident Activity" (Lessons Learned).
SANS Institute, Incident Handler's Handbook, 2011.
Chapter 1 (The Incident Response Process): Defines the six-step process explicitly as Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned.