During a security incident, after initial detection and analysis, an IT security analyst is determining which course of action to take to limit the damage and prevent extended downtime. Out of the following options, which should be prioritized?
Eradication
Recovery
Lessons learned
Containment