官术网_书友最值得收藏!

Incident life cycle

Every incident that starts must have an end, and what happens in between the beginning and the end are different phases that will determine the outcome of the response process. This is an ongoing process that we call the incident life cycle. What we have described until now can be considered the preparation phase. However, this phase is broader than that—it also has the partial implementation of security controls that were created based on the initial risk assessment (this was supposedly done even before creating the incident response process).

Also included in the preparation phase is the implementation of other security controls, such as:

  • Endpoint protection
  • Malware protection
  • Network security

The preparation phase is not static, and you can see in the following diagram that this phase will receive input from post-incident activity.

The other phases of the life cycle and how they interact are also shown in this diagram:

The DETECTION and CONTAINMENT phase could have multiple interactions within the same incident. Once the loop is over, you will move on to the post-incident activity phase. The sections that follow will cover these last three phases in more detail.

主站蜘蛛池模板: 朝阳县| 孝感市| 河源市| 白朗县| 新绛县| 玉树县| 富阳市| 拜城县| 临泉县| 永丰县| 雅江县| 阿克陶县| 内乡县| 德化县| 将乐县| 迭部县| 吕梁市| 老河口市| 丹棱县| 全州县| 岐山县| 宁津县| 茌平县| 大厂| 德化县| 黄梅县| 同仁县| 通城县| 伊川县| 江油市| 噶尔县| 扶风县| 平湖市| 镇原县| 尖扎县| 星座| 定西市| 丹江口市| 石阡县| 盈江县| 北宁市|