Final answer:
When a system is compromised, the first step is isolation to prevent further spread. The SANS Institute's incident handling process includes preparation, identification, containment, eradication, recovery, and lessons learned. A post-mortem analysis is crucial for improving future security measures.
Step-by-step explanation:
Response to a Compromised Workstation and Incident Handling
When notified of a system acting strangely with indications of a compromise, the first thing you should do is isolate the workstation or system. This is critical to prevent the spread of the threat to other systems and to contain any potential damage. Quarantining a file with antivirus software does not necessarily mean that the malware has been completely eradicated from the system. It is important to investigate further to ensure that all parts of the malware have been removed and to understand the full scope of the compromise.
The SANS Institute outlines a six-step incident handling process, which includes preparation, identification, containment, eradication, recovery, and lessons learned. Jumping into containment before fully identifying the incident can result in incomplete understanding, potentially causing more damage or overlooking parts of the breach. Therefore, having a security policy that defines the incident response process is essential for preparing and guiding an organization through properly handling such incidents.
Conducting a post-mortem or lessons learned is indeed the most important step. It provides opportunities for improvement, not just in incident response tactics, but in overarching security measures to prevent future data breaches. Through this process, businesses, organizations, medical systems, governments, and individuals learn and adjust their security posture to better protect sensitive information.