The process of isolating a system from a network to prevent further compromise of other networked assets.

  • Can be automated with automated response
  • Can be manual
  • Can have an isolation duration