From the course: Certificate of Cloud Security Knowledge (CCSK) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Containment, eradication, recovery, and postanalysis

Containment, eradication, recovery, and postanalysis

From the course: Certificate of Cloud Security Knowledge (CCSK) Cert Prep

Containment, eradication, recovery, and postanalysis

- [Instructor] When reviewing the third phase of IR, containment, eradication, and recovery, it's essential to consider the methods, processes, and tools used in production. For instance, if an organization is using infrastructure as code, immutable infrastructure, microservices, and federated environments, all of those factors empower the ability to contain, eradicate, and recover from an incident. Containment plans should be developed in collaboration with the system owner as they have the best understanding of the system. A robust containment capability is closely tied to practical understanding of identity and access management tools at the management playing level. In addition to managing human accounts in IAM tools, responder teams need to be aware of service accounts that could be compromised and exploited by attackers. Network containment is more easily facilitated since rules can be quickly implemented and changes made to prevent and further restrict access. Depending on the…

Contents