Cloud & Identity Compromise
Unauthorized access to cloud infrastructure or identity provider through stolen tokens, OAuth abuse, or misconfigured access policies.
Triage
4 proceduresContainment
4 proceduresP1
Credential and Account Lockdown
~45 min
P1
Revoke Cloud Sessions and Tokens
~30 min
P1
Isolate Compromised Kubernetes Workload
~120 min
P1
Contain Compromised Serverless Function
~90 min
Sponsored
Preservation
5 proceduresCollection
7 proceduresP1
Collect Kubernetes Control-Plane Audit Trail
~120 min
P1
Collect Serverless Execution and Management Evidence
~90 min
P2
EDR Telemetry Collection
~120 min
P2
M365 Unified Audit Log Collection
~90 min
P2
Azure AD Sign-In and Audit Log Collection
~60 min
P2
Identify Alternative Evidence When Primary Logs Are Missing
~60 min
P3
Coordinate Log Collection from Third-Party Vendors
~120 min