***
Skip to content

Containment & Eradication

Limit the spread and business impact of an incident through timely containment, then remove the attacker’s foothold and close the underlying weaknesses.

Containment decisions must balance speed with business impact: isolating the right systems quickly while avoiding unnecessary disruption.

Outcomes

  • Reduced blast radius and faster stabilization of critical services
  • Lower likelihood of repeat compromise from the same foothold
  • More predictable response actions with clear approvals
  • Better coordination between security and service owners

Typical scope

  • Containment playbooks (network isolation, credential resets, blocking)
  • Decision rights and approvals for disruptive actions
  • Eradication steps (remove persistence, patch exploited weaknesses)
  • Verification of clean state before restoration

GenAI-enabled execution

Agents can propose containment options and draft execution checklists, but high-impact actions should require human approval and produce traceable evidence of what was done and why.