Confirmed users
569
edits
(→Types of Vulnerabilities/Incidents to be disclosed: Added explanation about serious vulnerabilities) |
m (→Response and Mitigation: Minor edit) |
||
| Line 112: | Line 112: | ||
# Summarize the immediate actions taken to contain and mitigate the effects of the vulnerability/incident, including isolation of affected systems, removal of unauthorized access, application of patches, updates, or configuration changes, and restoration of services. | # Summarize the immediate actions taken to contain and mitigate the effects of the vulnerability/incident, including isolation of affected systems, removal of unauthorized access, application of patches, updates, or configuration changes, and restoration of services. | ||
# Highlight any collaboration or assistance received from external parties, such as incident response teams, forensics, or law enforcement. | # Highlight any collaboration or assistance received from external parties, such as incident response teams, forensics, or law enforcement. | ||
# Detail any other action items being taken to mitigate the effects of the vulnerabilities/incident, including the type of action (e.g. patching, access control, training, etc.), the status of each action, and the date each action will be completed. | # Detail any mitigation steps and other action items being taken to mitigate the effects of the vulnerabilities/incident, including the type of action (e.g. patching, access control, training, etc.), the status of each action, and the date each action will be completed. | ||
==== CA Remediation Measures ==== | ==== CA Remediation Measures ==== | ||