SY0-601: CompTIA Security+ Exam | CSIRT Lessons Learned Documentation

Include Logical Controls in Lessons Learned Documentation

Prev Question Next Question

Question

A CSIRT has completed restoration procedures related to a breach of sensitive data is creating documentation used to improve the organization's security posture.

The team has been specifically tasked to address logical controls in their suggestions.

Which of the following would be MOST beneficial to include in lessons learned documentation? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

AF.

The lessons learned documentation is a critical element of the incident response process. It helps an organization to identify and document the root cause of an incident, what was done to mitigate it, and how the organization can improve its security posture to prevent similar incidents in the future. In this scenario, the CSIRT is creating documentation related to a breach of sensitive data and has been specifically tasked to address logical controls in their suggestions.

The two most beneficial things to include in lessons learned documentation are:

B. Recommendations relating to improved log correlation and alerting tools One of the key ways to detect and respond to security incidents is through log correlation and alerting tools. In this scenario, the CSIRT should document recommendations to improve these tools, such as using a Security Information and Event Management (SIEM) solution that can help to detect anomalous behavior and alert the team of potential threats. This would help the organization to respond quickly to future incidents and reduce the impact of potential breaches.

F. A list of topics that should be added to the organization's security awareness training program based on weaknesses exploited during the attack. Employee training is an essential element of any organization's security posture. In this scenario, the CSIRT should document weaknesses that were exploited during the attack and create a list of topics that should be added to the organization's security awareness training program. For example, the CSIRT could recommend training employees on how to identify phishing emails, how to create strong passwords, or how to recognize and report suspicious activity. This would help to improve the organization's overall security posture by empowering employees to be more security-conscious.

The other answer choices may also be relevant in certain situations, but they are not the most beneficial things to include in this particular scenario.

A. A list of policies that should be revised to provide better clarity to employees regarding acceptable use While policies are important, revising them to provide better clarity regarding acceptable use is not directly related to logical controls. It may be beneficial to include this in the documentation as a general recommendation, but it is not the most beneficial thing to include in this particular scenario.

C. Data from the organization's IDS/IPS tools, which show the timeline of the breach and the activities executed by the attacker While data from IDS/IPS tools can be useful in determining the timeline of a breach and the activities executed by an attacker, it is not directly related to logical controls. It may be beneficial to include this information in the documentation to provide a more comprehensive view of the incident, but it is not the most beneficial thing to include in this particular scenario.

D. A list of potential improvements to the organization's NAC capabilities, which would improve AAA within the environment While NAC capabilities can help to improve authentication, authorization, and accounting (AAA) within the environment, it is not directly related to logical controls. It may be beneficial to include this in the documentation as a general recommendation, but it is not the most beneficial thing to include in this particular scenario.

E. A summary of the activities performed during each phase of the incident response activity While a summary of the activities performed during each phase of the incident response activity can be useful in documenting the response process, it is not directly related to logical controls. It may be beneficial to include this in the documentation to provide a more comprehensive view of the incident, but it is not the most beneficial thing to include in this particular scenario.