||Get prepared for a security incident.
||Gather information about a threat that has triggered a security incident, its TTPs, and affected assets.
||Prevent a threat from achieving its objectives and/or spreading around an environment.
||Remove a threat from an environment.
||Recover from the incident and return all the assets back to normal operation.
||Discover how to improve the Incident Response process and implement the improvements.