Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational efficiency. Clearly document use cases that pertain to the incidents commonly faced by your organization.

Customize the credential compromise runbook by including the following sections for each single user, privileged user, and multiple users:

  • Incident summary
  • Escalation process diagram
  • Detailed response procedures
  • Revision history

Align the response procedures with Phase 2 of the blueprint, Develop and Implement a Security Incident Management Program.

Also In

Develop and Implement a Security Incident Management Program

Create a scalable incident response program without breaking the bank.

Related Content

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.