Which of the following should be the NEXT step after a security incident has been reported?
Recovery
Investigation
Escalation
Containment
Submit