ComputerIncident Containment Strategy
A Flowchart by amy.moody
To print this page, right mouse click, open "Print preview", "Print" or a similar option depending on your browser, then use the controls to size this page appropriately. Go to for the original version of this flowchart. Find and create other free decision making tools at Use our interactive selectors to find the best college, best career, right religion, most appropriate dog breed, best college major and more.
Make Your Own Flowchart All Rights Reserved.

Possible incident reported or suspected
Appropriate investigating team surveys suspected incident to determine validity
Valid Incident?
Determine Priority, notify incident coordinator


Process ends with notification to system owner and person reporting suspected incident
Incident declared?


Perform more analysis
Further investigation or analysis needed?
Notify appropriate personnel, convene coordinating and investigating teams


Incident containment
Incident eradication
Implement controls

Incident follow-up