SOCチームは、エンドポイントでの侵害の潜在的な指標を確認しました。チームは、実行可能ファイルのタイプを新しいトロイの木馬ファミリーに絞り込みました。 NIST Computer Security Incident Handling Guideによると、このイベントを処理するための次のステップは何ですか?
正解:C
According to the NIST Computer Security Incident Handling Guide, the next step in handling an event after confirming a potential indicator of compromise on an endpoint is to collect public information on the malware behavior. This step involves searching for information from various sources, such as antivirus vendors, security blogs, threat intelligence feeds, and online forums, to learn more about the characteristics, capabilities, and impact of the malware. This information can help the SOC team to identify the type, severity, and scope of the incident, as well as to determine the appropriate response actions and mitigation strategies. Isolating the infected endpoint, performing forensics analysis, and prioritizing incident handling are subsequent steps that follow after collecting public information on the malware behavior. Reference:
Computer Security Incident Handling Guide
SP 800-61 Rev. 2, Computer Security Incident Handling Guide