The physical security department received a report that an unauthorized person followed an authorized individual to enter a secured premise.
The incident was documented and given to a security specialist to analyze.
Which step should be taken at this stage?
Click on the arrows to vote for the correct answer
A. B. C. D.D.
The situation described in the question refers to a security incident where an unauthorized person managed to enter a secured premise by following an authorized individual. The physical security department has documented the incident and has given it to a security specialist to analyze. At this stage, the following step should be taken:
D. Identify movement of the attacker in the enterprise.
The reason for this is that it is crucial to understand the extent of the attacker's movements and identify any potential areas of compromise or security vulnerabilities. By tracking the attacker's movements, it is possible to determine the scope of the breach and take appropriate actions to prevent further damage.
Steps A, B, and C may also be relevant to the incident investigation, but they are not the most appropriate next step.
A. Determine the assets to which the attacker has access may be useful after the attacker's movement has been identified. This step can help to prioritize the most critical assets and systems that require immediate attention.
B. Identify assets the attacker handled or acquired is an important step to take, but it comes after identifying the attacker's movement. This step is useful to determine whether any sensitive data or resources have been compromised or exfiltrated.
C. Change access controls to high-risk assets in the enterprise may also be useful, but it should be done after the attacker's movement has been identified. Changing access controls too early may alert the attacker, making it harder to track them down.
In summary, the most appropriate next step after receiving the incident report is to identify the movement of the attacker in the enterprise to determine the scope of the breach and take appropriate actions to prevent further damage.