Security Incident Management Runbook: Credential Compromise

Author(s): Nitin Mukesh

  • Security Incident Management Runbook: Credential Compromise

  • Security Incident Management Workflow: Credential Compromise (Visio)

  • Security Incident Management Workflow: Credential Compromise (PDF)

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational efficiency. Clearly document use cases that pertain to the incidents commonly faced by your organization.

Customize the credential compromise runbook by including the following sections for each single user, privileged user, and multiple users:

  • Incident summary
  • Escalation process diagram
  • Detailed response procedures
  • Revision history