Generate a high-level outline of steps to perform a foundational security audit for a small system or application.
Outline the basic steps involved in performing a foundational security audit for a [system_type] system or application. Focus on key areas like [key_area_1] and [key_area_2]. Provide the steps as a numbered list.
Create a detailed framework for an incident response plan, covering detection, containment, eradication, recovery, and post-incident analysis for any organization.
Create a prioritization matrix for identified security vulnerabilities, considering their severity, exploitability, and potential business impact to guide remediation efforts.