Rapid response guide for when a user account is suspected or confirmed compromised.
Essential steps to contain and investigate a compromised user account, with focus on speed and preservation.
Take these steps within the first 5 minutes.
Understand how the account was compromised.
Determine what the attacker did with access.
Prevent the compromise from spreading.
Restore access and inform stakeholders.