containing-active-breach

Installation
SKILL.md

Containing Active Breaches

When to Use

  • A confirmed intrusion is in progress with an active adversary on the network
  • Malware is spreading laterally across endpoints or servers
  • A compromised account is being used for unauthorized access to systems
  • Ransomware encryption has been detected and is actively propagating
  • An attacker has established command-and-control communications from internal hosts

Do not use for post-incident cleanup when the adversary is no longer active; use eradication procedures instead.

Prerequisites

  • Confirmed incident classification with P1 or P2 severity from triage
  • EDR console access with host isolation capabilities (CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne)
  • Network firewall and switch management access for segmentation
  • Active Directory or identity provider administrative access for credential actions
  • Pre-approved containment authority documented in the incident response plan
Related skills
Installs
15
GitHub Stars
6.2K
First Seen
Mar 15, 2026