Apply mitigation techniques or controls to secure an environment in a given security incident.
Examples: application approved/denied list, quarantine, firewall rules, mobile device management (MDM), data loss prevention (DLP), update or revoke certificates