3.4.1. Eradicate the incident. Identify and mitigate all vulnerabilities that