Conclusion
Each operations phase has unique goals, techniques, methodologies, and strategies. Table 4 summarizes these phases and some of the techniques and methodologies covered in this section.
Table 4 – Operations phases: Goals, techniques, and methodologies
Phase | Goal | Techniques and methodologies |
---|---|---|
Detection | Identify a potential security event. |
|
Analysis | Determine if the security event is an incident and assess the scope of the incident. |
|
Containment | Minimize and limit the impact of the security event. |
|
Eradication | Remove unauthorized resources or artifacts related to the security event. |
|
Recovery | Restore systems to a known good state and monitor these systems to ensure the threat does not return. |
|