Chapter 8

Restoring Trust and Business Services After a Breach

Kevvie Fowler; Chris Pogue; Paul Hanley

Abstract

This chapter guides the reader through how to identify and recover compromised systems and ensure the environment is secure, stable, and ready to resume business operations.

Keywords

Indicator of Compromise (IoC); Indicators of Attack (IoA); Containment; Recovery; Isolating systems; Identifying compromised hosts; Certifying your environment; Restoring business services; Postmortem; Breach events; Cyber defensible position; Red Team

Get Data Breach Preparation and Response now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.