Preserving Chain of Custody After an Internal Server Compromise | CISA Exam Preparation

Preserving Chain of Custody After an Internal Server Compromise

Prev Question Next Question

Question

To preserve chain of custody following an internal server compromise, which of the following should be the FIRST step?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

The correct answer is B. Safely shut down the server.

Explanation:

When an internal server compromise occurs, the primary concern is to preserve the evidence in a way that maintains the chain of custody. The chain of custody refers to the chronological documentation or paper trail that records the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence.

The first step to preserve the chain of custody is to safely shut down the server. This ensures that any running processes, such as malware or backdoors, are stopped, and that the data on the server is not altered or deleted. If the server is left running, the attacker may continue to manipulate the data or use the server to launch additional attacks.

After the server is safely shut down, the next step would be to take a system image, including a memory dump. This is done to create a forensic copy of the server's data, which can be analyzed to determine the scope and extent of the compromise. The system image should be created using forensically sound methods to ensure that the data is not altered or tampered with in any way.

Replicating the attack using the remaining evidence or tracing the attacking route may be useful in determining how the attacker gained access to the server, but these steps should not be taken until after the server has been safely shut down and a system image has been created.

In summary, the correct sequence of steps to preserve the chain of custody following an internal server compromise is as follows:

  1. Safely shut down the server.
  2. Take a system image, including a memory dump, using forensically sound methods.
  3. Analyze the system image to determine the scope and extent of the compromise.
  4. Replicate the attack using the remaining evidence or trace the attacking route to determine how the attacker gained access to the server.