Define Containment Action Preferences
Containment actions enable Security Incident Response to execute rapid response measures during an active security incident, such as isolating compromised hosts or rotating credentials. These actions help quickly mitigate the impact of security incidents in your environment.
Important
Security Incident Response does not enable containment capabilities by default. You must explicitly authorize containment actions through your containment preferences.
To authorize Security Incident Response engineers to perform containment actions on your behalf, you must define your organization or account-level containment preferences. Account-level preferences supersede organization-level preferences.
Prerequisites: You must have permissions to create AWS Support cases.
Containment Options:
-
No containment actions (default) - Security Incident Response engineers will not perform any containment actions on your behalf.
-
Containment with approval - Security Incident Response engineers will request your approval before executing containment actions.
-
Automatic containment - Security Incident Response engineers can execute containment actions immediately without prior approval during active incidents.
To define containment preferences:
-
Create an AWS Support case requesting to configure containment action preferences for Security Incident Response.
-
In your support case, specify:
-
Your AWS Organization ID or specific account IDs where containment actions should be authorized
-
Your preferred containment option (no containment, containment with approval, or automatic containment)
-
The types of containment actions you want to authorize (such as EC2 instance isolation, credential rotation, or security group modifications)
-
-
AWS Support will work with you to configure your containment preferences. You will need to deploy the necessary AWS CloudFormation StackSet that creates the required IAM roles. AWS Support can provide assistance if needed.
Once configured, Security Incident Response can execute the authorized containment actions during active security incidents to help protect your environment.
Next steps: After containment preferences are configured, you can monitor containment actions taken during incidents in the Security Incident Response console.