Customize the Credential Compromise Use Case by including the following sections for each single user, privileged user, and multiple users:
- Incident summary
- Escalation process diagram
- Detailed response procedures
- Revision history
Align the response procedures with Phase 2: Operate as outlined in the Develop and Implement a Security Incident Management Program blueprint.