The process of isolating a system from a network to prevent further compromise of other networked assets.
- Can be automated with automated response
- Can be manual
- Can have an isolation duration
The process of isolating a system from a network to prevent further compromise of other networked assets.