When You've Been Hacked
When an alert triggers, you need a plan.
- Isolate: Block the IP via
iptables. - Identify: Use
lsof -ito see current network connections. - Preserve: Copy logs to a secure location for forensic analysis.
- Restore: Redeploy from a known clean image in your CI/CD.