The Fourteen Steps 1. Stop the attack in progress. 2. Cut off the attack vector. 3. Assemble the response team. 4. Isolate affected instances. 5. Identify timeline of attack. 6. Identify compromised data. 7. Assess risk to other systems.
9. Apply additional mitigations, additions to monitoring, etc. 10.
Forensic analysis of compromised systems.
11. Internal communication. 12.
Involve law enforcement.
13.
Reach out to external parties that may have been used as vector for attack.
14.
External communication.
8. Assess risk of re-attack.