Security breach post mortem / analysis
Thank you for your assignment and your trust. To optimize the output and to get started quickly, I would need the following:
- Who is involved with the case on your side? Add me (email@example.com) to a chat/hangout/telegram group with your dev/ops team for technical discussion.
- Send me an overview of what you have found so far.
- Who discovered the breach? When and how?
- Established timeline
- Suspected point of entry
- Affected services