Incident containment
What is containment?
Goals
Assessing operational state of resources
Minimize the spreading of any threat
Determine next steps
Shut down affected systems?
Disconnect systems from network but leave running?
Continue memory forensics and study threat actor?
Ensure scope limiting
Documentation
PreviousIdentification tools and techniquesNextDetermining status of infected/affected computing resources
Last updated