The process of regaining a secure state for a system after detecting that the system has experienced a security compromise.