During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?
Recovery
Lessons learned
Containment
Eradication