IRM-2022 (Incident Response Methodologies 2022) CERT Societe Generale with the collaboration of CERT aDvens provides easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved. One IRM exists for each security incident we're used to dealing with. CERT Societe Generale would like to thank SANS and Lenny Zeltser who have been a major source of inspiration for some IRMs. We also would like to thank CERT aDvens for the collaborative work and the French translation. Feel free to contact us if you identify a bug or an error in these IRMs. This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A System for Abuse- and Incident Handling with log file analysis capabilities.
A comprehensive auditd configuration for Linux systems following best practices.
A set of scripts for collecting forensic data from Windows and Unix systems respecting the order of volatility.
Stronghold is the easiest way to securely configure your Mac.
Modular SOAR implementation in Python for security orchestration, automation, and response.
Enhances Windows OS security through system modifications and settings adjustments.