Problem Statement
Outline key steps for responding to a security incident in a cloud environment.
Explanation
1. **Detection:** Identify anomalies through cloud-native monitoring (e.g., GuardDuty, Sentinel).
2. **Containment:** Isolate affected accounts, instances, or containers.
3. **Eradication:** Remove malicious files or misconfigurations.
4. **Recovery:** Restore clean resources and reapply IAM controls.
5. **Review:** Conduct lessons learned and update automation workflows.