RS.MI-02:

Incidents are eradicated

Implementation Examples

Ex1:

Cybersecurity technologies and cybersecurity features of other technologies (e.g., operating systems, network infrastructure devices) automatically perform eradication actions

Ex2:

Allow incident responders to manually select and perform eradication actions

Ex3:

Allow a third party (e.g., managed security service provider) to perform eradication actions on behalf of the organization