Command Palette

Search for a command to run...

Skip to main content
Security Operations

Incident Response

Our structured approach to managing and mitigating security incidents to protect our customers and infrastructure.

Subsidiary Disclosure: HUK SONS IT operates as a legally separate subsidiary of HUK SONS. When you engage with this site or our services, you are interacting with HUK SONS IT (a subsidiary of HUK SONS) as the contracting entity, unless a signed agreement specifies otherwise.

Last Updated: November 30, 2025 | Version 1.1

Response Lifecycle

We follow the NIST Computer Security Incident Handling Guide (SP 800-61) framework.

STEP 1

Preparation

Establishing response capabilities, training, and preventive measures.

STEP 2

Detection

Continuous monitoring and analysis of security events.

STEP 3

Containment

Isolating affected systems to prevent further damage.

STEP 4

Eradication

Removing the root cause and malware from the environment.

STEP 5

Recovery

Restoring systems to normal operation and verifying integrity.

STEP 6

Post-Incident

Analyzing the incident to improve future response.

Severity Classification

How we categorize and prioritize security incidents.

SEV-1

Critical

Critical business impact, data breach, or widespread outage.

SEV-2

High

Significant impact, partial outage, or high-risk vulnerability.

SEV-3

Medium

Moderate impact, degraded performance, or isolated issue.

SEV-4

Low

Minor impact, cosmetic issue, or informational event.

Report a Security Incident

If you suspect a security incident or vulnerability involving HUK SONS IT systems, please report it immediately. We operate 24/7/365.