Credential Compromise Use Case Template

Author(s): Jessica Ireland, Celine Gravelines

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Customize the Credential Compromise Use Case by including the following sections for each single user, privileged user, and multiple users:

  • Incident summary
  • Escalation process diagram
  • Detailed response procedures
  • Revision history

Align the response procedures with Phase 2: Operate as outlined in the Develop and Implement a Security Incident Management Program blueprint.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019