Incident Response
Containment – Technical Containment for Security Incidents
Containment is the most critical phase of any incident response. The goal is to rapidly stop an ongoing compromise, prevent further spread, and stabilize your systems — without destroying forensic evidence.
Interrupt lateral movement
Preserve evidence
Retain forensic artifacts
Stabilize
Restore controlled operational security
Why containment is critical
- lateral movement across the network
- active compromised accounts
- persistence mechanisms
- undetected data exfiltration
- overall damage
- regulatory pressure
- recovery costs
Containment shortens this window.
Containment objectives
- stop attacker movement
- interrupt command & control
- isolate compromised assets
Secondary
- preserve evidence
- gain situational awareness
- maintain operational capability
- system rebuilds
- cleanup activities
- hardening
Typical technical scope
Network & Infrastructure
- segmentation / isolation of affected hosts
- blocking known IOC IPs & domains
- restricting east–west traffic
- disabling compromised VPN access
Identity & Access
- disabling compromised accounts
- token invalidation
- emergency MFA activation
- analysis of privileged access paths
Endpoints & Servers
- EDR containment (Defender / CrowdStrike / SentinelOne)
- live response sessions
- acquisition of volatile artifacts
- identification of active processes
Cloud / M365 / Entra ID
- review of suspicious sign-ins
- conditional access hardening
- review of service principals
- API token rotation
When is containment required?
- malware / ransomware
- admin anomalies
- cloud account takeover
- data exfiltration
- SIEM / MDR escalation
- unclear root cause
- partial visibility
- operational pressure
- management escalations
Our containment process
Assess situation
Stop spread
Preserve evidence
Secure operations
Common mistakes
- immediate system rebuilds
- uncoordinated password resets
- power-off instead of isolation
- no clear incident ownership
- missing evidence preservation
What you should prepare
- alerts / screenshots
- affected systems
- short timeline
- actions already taken
- decision maker
Outcomes (Deliverables)
Management situation brief
compromised assets
attack hypothesis
next steps
GDPR / NIS2 context
Technical foundation for:
- data exfiltration assessment
- notification decisions
- proof of due diligence
FAQ
Reset passwords immediately?
Yes — but coordinated.
Power off systems?
No. Isolate instead.
Start time?
1–2 business days, faster for active incidents.