The full scope of the service includes the following activities:
- Confirmation of the actual occurrence of the incident.
- Determining the extent of the incident.
- Identification of the immediate cause of the incident (vulnerability used).
- Assistance in reaching all parties involved.
- Assistance in reaching the appropriate legal services, if necessary.
- Contacting and reporting to other CSIRTs.
- Preparation of notifications for users, if necessary.
- Elimination of the vulnerability.
- Protecting the system against the spread of the incident.
- Protecting the system against the effects of the incident.
- Securing the evidence.
Do you have questions about the service or do you need a personalized offer? Email us with questions.