Which step follows Identification in the incident handling process?

Prepare for the SANS Global Industrial Cyber Security Professional Exam. Test your skills with multiple choice questions featuring hints and explanations. Ensure your success with our comprehensive materials.

In the incident handling process, after the Identification phase, the next critical step is Containment. This stage is essential because, once an incident has been identified, it is crucial to limit the scope and impact of the incident on the organization. Containment involves implementing measures to prevent the incident from spreading further and causing additional damage to systems or data.

Effective containment strategies can vary depending on the nature of the incident but may include isolating affected systems, disabling user accounts that were compromised, or implementing additional network controls to prevent unauthorized access. By addressing the incident swiftly, organizations can mitigate potential losses and set the stage for further actions, such as eradication and recovery.

In contrast, the other steps that might seem relevant occur later in the incident handling process. Recovery focuses on restoring affected systems and normal operations after the threat has been contained and eradicated. Eradication occurs after containment, aimed at removing the threat from the environment entirely. Preparation, while vital for a comprehensive incident response framework, is prior to the incident and is not part of the immediate response once an incident has been identified. This makes Containment the appropriate step following Identification.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy