Concept Flow - Containment strategies
Detect Threat
Identify Scope
Select Containment Strategy
Short-term Containment
Isolate Affected Systems
Monitor & Verify
Recovery
Review
The flow starts with detecting a threat, then identifying its scope, choosing a containment strategy (short-term or long-term), isolating affected systems or applying fixes, monitoring, recovering, and finally reviewing the process.