Implementation method

Specialists of the incident response team will participate in the form of: onsite or remote. The forensic process will be performed on copies of evidence to avoid altering or disordering the evidence on the real system.

Results

Detailed report about the response process (tool deployment, information gathering, data analysis and checked computers and servers).
Detailed lists of detected security issues, including Indicators of Compromise (IOCs).
Provide mitigation plan, or temporary remediation for those security issues.