• Home
  • Services
    • Cybersecurity
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
  • Careers
  • Contact Us

Jazz Solutions, Inc. (JSL)  

  • solutions@jazzsol.com
Connect with JSL
  • Home
  • Services

      Cybersecurity

      JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.

      Learn More

      ICAM

      JSL provides customers with  reliable, secure solutions across multiple ICAM technologies to protect systems and data.

      Learn More

      System & Application Development

      JSL’s Agile process emphasizes collaboration, hands-on demos of functionality, and usable software with each cycle.

      Learn More

      IT Support Services

      JSL’s IT support services allow our clients to focus on their core competencies, improve operational efficiency, and reduce costs.

      Learn More

      Low-Code Development

      JSL offers low-code, full-custom development, and hybrid solutions, focusing on immediate needs as well as long-term success.

      Learn More

      Consulting & Advisory Services

      JSL helps government agencies improve efficiency, streamline processes, and manage resources.

      Learn More

    • Cybersecurity
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
  • Careers
  • Contact Us
Linkedin
  • Home
  • Services

      Cybersecurity

      JSL’s security team applies a comprehensive view of IT security, integrating assessment, audit, and compliance.

      Learn More

      ICAM

      JSL provides customers with  reliable, secure solutions across multiple ICAM technologies to protect systems and data.

      Learn More

      System & Application Development

      JSL’s Agile process emphasizes collaboration, hands-on demos of functionality, and usable software with each cycle.

      Learn More

      IT Support Services

      JSL’s IT support services allow our clients to focus on their core competencies, improve operational efficiency, and reduce costs.

      Learn More

      Low-Code Development

      JSL offers low-code, full-custom development, and hybrid solutions, focusing on immediate needs as well as long-term success.

      Learn More

      Consulting & Advisory Services

      JSL helps government agencies improve efficiency, streamline processes, and manage resources.

      Learn More

    • Cybersecurity
    • ICAM
    • System & Application Development
    • IT Support Services
    • Low-Code Development
      • Grants Management Solutions
    • Consulting & Advisory Services
  • About
    • About JSL
    • Contract Vehicles
    • Resources
    • JSL Companies
    • JSL Defense
    • Giving Back
  • Case Studies
    • Case Study: Securing Millions of Accounts with MFA
    • Case Study: Modernizing Labor’s Job Corps System
  • Clients
  • News
    • Press Releases
    • Cybersecurity Blog
  • Careers
  • Contact Us
Linkedin
Cybersecurity

‘The Triple C’​ Approach to Security Incident Response

By Avery Moore 

Creating an incident response (IR) capability can be a daunting task. The National Institute of Standards and Technology (NIST) alone has a dozen or so security controls related to just that topic.

The prevention of all security incidents is the ideal scenario; but the fact is that security incidents do occur and being able to respond to them should be a priority in your organization. But how can this be done? 

Auditors and assessors examine an organization’s compliance against specific controls, and issue findings typically without regard for how that organization is maturing in that area. IR can and should be viewed as a miniature maturity model with the most critical concepts addressed first, while simultaneously planning for implementation of more advanced capabilities. Viewing this as a maturity model shifts your focus from where you are now to where you’re going. NIST’s Computer Security Incident Handling Guide breaks down the IR life cycle as follows:

  • Preparation 
  • Detection & Analysis 
  • Containment, Eradication & Recovery 
  • Post-Incident Activity 

Volumes have been written about the above phases, but I will focus on one small but critical piece: Containment. 

Once you understand that a security incident is occurring, it’s important to quickly get to a state of containment to avoid further damage or data loss. Being in a contained state allows the organization a moment to breathe so that the next step can be taken.  

Using a first-aid analogy, containment means stop the bleeding. When a person is hurt, you don’t start asking about their life choices and circumstances that led to the problem. The most important thing is to stop the bleeding and get to containment. After that is achieved, other important measures can be taken. 

Security incident containment, however, doesn’t just occur on its own. Some critical functions must be established to implement that capability while the organization is building out the other aspects and capabilities of IR. Those minimal functions are Communication and Coordination. 

If an organization can communicate and coordinate during security incidents, they will be much more successful in achieving containment. I call this the “Triple C”: Communication and Coordination leads to Containment. 

Proper communication enables responders to: 

  • Talk an issue out quickly and effectively; 
  • Know who to talk to about what; and 
  • Speak the language of IR. 

None of the above works well without coordination. Proper coordination enables responders to: 

  • Know what team members and support members do what; 
  • Keep communications short and focused; and 
  • Know their own role and job. 

If your communication and coordination are executed well, that will lead you to containment, where: 

  • The root issue is identified and stopped or isolated quickly; 
  • Further issues are prevented; 
  • Damage is minimized; and 
  • The “bleeding” is stopped. 

Using this “Triple C” concept as a step in your IR maturity model means that you can’t simply stop once you’ve determined you can contain an incident.  

A static security incident containment program is not adequate in the long term. While implementing these minimal measures, organizations should simultaneously be working on implementing or shoring up measures for detection & analysis, eradication, and recovery.  

After all, you can’t contain a security incident if you haven’t found it first.  

Share Post


JSL awarded economic development incentive program grant by City of Virginia Beach
Previous Article
I use Last Pass. What now?
Next Article

Jazz Solutions, Inc.
Engineered to ExecuteTM
solutions@jazzsol.com

Main Office

20745 Williamsport Place, Ste 320
Ashburn, VA 20147

DC Office

840 First Street, NE,
Ste 450
Washington, DC 20002

Virginia Beach Office

477 Viking Drive, Ste 415
Virginia Beach, VA 23452


Copyright 2025 Jazz Solutions, Inc.
Linkedin
Legal Statements and Privacy Policy