Updated: 2026-01-26

Report incident

What to prepare

  • Short incident description
  • Affected systems/accounts (if known)
  • Current actions taken
  • Access to logs/SIEM (if available)
  • Decision maker contact

Incident Response

Containment – Technical Containment for Security Incidents

Containment is the most critical phase of any incident response. The goal is to rapidly stop an ongoing compromise, prevent further spread, and stabilize your systems — without destroying forensic evidence.

🛑 Stop the attack

Interrupt lateral movement

Preserve evidence

Retain forensic artifacts

Stabilize

Restore controlled operational security


Why containment is critical

In real-world incidents we typically see:
  • lateral movement across the network
  • active compromised accounts
  • persistence mechanisms
  • undetected data exfiltration
Every hour of delay increases:
  • overall damage
  • regulatory pressure
  • recovery costs

Containment shortens this window.


Containment objectives

🎯 Primary
  • stop attacker movement
  • interrupt command & control
  • isolate compromised assets

Secondary

  • preserve evidence
  • gain situational awareness
  • maintain operational capability
⛔ Not part of containment
  • system rebuilds
  • cleanup activities
  • hardening

Typical technical scope

Network & Infrastructure

  • segmentation / isolation of affected hosts
  • blocking known IOC IPs & domains
  • restricting east–west traffic
  • disabling compromised VPN access

Identity & Access

  • disabling compromised accounts
  • token invalidation
  • emergency MFA activation
  • analysis of privileged access paths

Endpoints & Servers

  • EDR containment (Defender / CrowdStrike / SentinelOne)
  • live response sessions
  • acquisition of volatile artifacts
  • identification of active processes

Cloud / M365 / Entra ID

  • review of suspicious sign-ins
  • conditional access hardening
  • review of service principals
  • API token rotation

When is containment required?

Typical triggers
  • malware / ransomware
  • admin anomalies
  • cloud account takeover
  • data exfiltration
  • SIEM / MDR escalation
Real-world situations
  • unclear root cause
  • partial visibility
  • operational pressure
  • management escalations

Our containment process

1) Triage

Assess situation

2) Isolation

Stop spread

3) Preservation

Preserve evidence

4) Stabilization

Secure operations


Common mistakes

  • immediate system rebuilds
  • uncoordinated password resets
  • power-off instead of isolation
  • no clear incident ownership
  • missing evidence preservation

What you should prepare

  • alerts / screenshots
  • affected systems
  • short timeline
  • actions already taken
  • decision maker

Outcomes (Deliverables)

Management situation brief

compromised assets

attack hypothesis

next steps


GDPR / NIS2 context

Technical foundation for:

  • data exfiltration assessment
  • notification decisions
  • proof of due diligence

FAQ

Reset passwords immediately?

Yes — but coordinated.

Power off systems?

No. Isolate instead.

Start time?

1–2 business days, faster for active incidents.


Request containment

If it is urgent, reach out as early as possible.

Report incident