Cutting off the attacker’s access without destroying evidence.

Needs a clear "Impact Assessment" to decide if the mission can continue.

Follows the granular technical steps to patch the vulnerability.