Incident Command Platform
← Glossary

Eradication - NIST 800-61 Incident Response Phase

Eradication is the NIST SP 800-61 incident response phase in which the adversary's persistence mechanisms, malware, accounts, and access methods are removed from affected systems. Eradication follows containment and precedes recovery; it is distinct from both. Immature programs frequently skip directly from containment to recovery without proper eradication, which is one of the most common reasons for re-infection.

Source: NIST SP 800-61 Rev. 3, MITRE D3FEND Evict tactic.

What Eradication Removes

Eradication Strategies

For most modern intrusions, full eradication on a compromised endpoint requires a rebuild from known-good images rather than cleanup in place. Cleanup-in-place is acceptable only for narrow-scope compromises with well-understood persistence and verified removal. For Active Directory or identity-provider compromise, eradication often requires forest-level remediation or migration to a new tenant.

Eradication Validation

Eradication is not complete until validated. Validation includes:

Run eradication with full validation

IR-OS supports eradication workflows, validation checklists, and the defensible record that proves the adversary is gone.

Start free