セキュリティ アナリストが SIEM を確認して、次のレポートを生成します。

その後、インシデント対応チームはVM001ホストへの攻撃が実行されたことを検知しました。SIEMプラットフォームのアラートプロセスを強化するために、セキュリティアナリストは次のうちどれを行うべきでしょうか?
正解:B
The SIEM already contains multiple events that, if correlated, would have indicated an active attack sequence on VM001-such as denied connections, IPS alerts, malware detection, and then an allowed connection. CAS-005 Security Operations objectives emphasize log correlation as a way to enhance detection by linking related events across different time stamps and data sources into a single, higher-confidence alert.
Option A (adding EDR logs) could add visibility but does not address the need to connect existing events for earlier detection.
Option C (improving parsing) ensures readability but does not create actionable alerts.
Option D (creating a new malware detection rule) is redundant since malware detection already appeared in logs; the issue was the lack of correlation to act on it in time.
By correlating IDS, IPS, firewall, and malware detection logs, the SIEM can raise a higher-priority alert before the attack is completed.