The task or activity to be performed (i.e., the 'verb')

Enumeration Members

Allow: "allow"

Permit access to or execution of a Target

Cancel: "cancel"

Invalidate a previously issued Action

Contain: "contain"

Isolate a file, process, or entity so that it cannot modify or access assets or processes

Copy: "copy"

Duplicate an object, file, data flow, or artifact

Create: "create"

Add a new entity of a known type (e.g., data, files, directories)

Delete: "delete"

Remove an entity (e.g., data, files, flows)

Deny: "deny"

Prevent a certain event or action from completion, such as preventing a flow from reaching a destination or preventing access

Detonate: "detonate"

Execute and observe the behavior of a Target (e.g., file, hyperlink) in an isolated environment

Investigate: "investigate"

Task the recipient to aggregate and report information as it pertains to a security event or incident

Locate: "locate"

Find an object physically, logically, functionally, or by organization

Query: "query"

Initiate a request for information

Redirect: "redirect"

Change the flow of traffic to a destination other than its original destination

Remediate: "remediate"

Task the recipient to eliminate a vulnerability or attack point

Restart: "restart"

Stop then start a system or an activity

Restore: "restore"

Return a system to a previously known state

Scan: "scan"

Systematic examination of some aspect of the entity or its environment

Set: "set"

Change a value, configuration, or state of a managed entity

Start: "start"

Initiate a process, application, system, or activity

Stop: "stop"

Halt a system or end an activity

Update: "update"

Instruct a component to retrieve, install, process, and operate in accordance with a software update, reconfiguration, or other update