Which phase of the incident response lifecycle involves identifying indicators of compromise (IoCs) in a cloud environment?