1 Recognition that a problem exists. Typically, this occurs when an IDS signals an alert or as a result of log analysis by a systems administrator.
2 Containment of the problem. Once an intrusion is detected, prompt action is needed to stop it and to contain the damage.
3 Recovery. Damage caused by the attack must be repaired. This may involve restoring data from backup and reinstalling corrupted programs. Backup and disaster recovery procedures are discussed in more detail in Chapter 8.
4 Follow-up. Once recovery is in process, the CERT should lead the analysis of how the incident occurred. Steps need to be taken to modify existing security policy and procedures to minimize the likelihood of a similar incident occurring