Conclusion
Each operations phase has unique goals, techniques, methodologies, and strategies. Table 4 summarizes these phases and some of the techniques and methodologies covered in this section.
Table 4 – Operations phases: Goals, techniques, and methodologies
| Phase | Goal | Techniques and methodologies |
|---|---|---|
| Detection | Identify a potential security event. |
|
| Analysis | Determine if the security event is an incident and assess the scope of the incident. |
|
| Containment | Minimize and limit the impact of the security event. |
|
| Eradication | Remove unauthorized resources or artifacts related to the security event. |
|
| Recovery | Restore systems to a known good state and monitor these systems to ensure the threat does not return. |
|