Restoring Trust and Business Services After a Breach
Kevvie Fowler; Chris Pogue; Paul Hanley
Abstract
This chapter guides the reader through how to identify and recover compromised systems and ensure the environment is secure, stable, and ready to resume business operations.
Keywords
Indicator of Compromise (IoC); Indicators of Attack (IoA); Containment; Recovery; Isolating systems; Identifying compromised hosts; Certifying your environment; Restoring business services; Postmortem; Breach events; Cyber defensible position; Red Team
Get Data Breach Preparation and Response now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.