1. Cichonski
P.
Millar
T.
Grance
T.
& Scarfone
K. (2012). Computer Security Incident Handling Guide (NIST Special Publication 800-61
Rev. 2). National Institute of Standards and Technology. Section 3.3
"Containment
Eradication
and Recovery
" states
"Containment is the first step in this phase... Containment is important before an incident overwhelms resources or increases damage." (p. 26). https://doi.org/10.6028/NIST.SP.800-61r2
2. ISACA. (2019). CISA Review Manual
27th Edition. Domain 4: Information Systems Operations and Business Resilience. The manual outlines the incident management process
emphasizing that after detection and analysis
the immediate response is to contain the incident to limit the extent of the damage.
3. Carnegie Mellon University Software Engineering Institute. (2017). CSIRT Services. "Containment: Limiting the scope and magnitude of the event." This is listed as a primary service and a critical step in the incident handling process
following initial analysis. Retrieved from https://resources.sei.cmu.edu/assetfiles/WhitePaper/2017019001503734.pdf (p. 5).