See the first sentence of CISM Exam Guide regarding Eradication " The eradication phase of security incident response is concerned with the removal of the agent or factors that caused or aided the incident." . Doing a root cause is part of the activities but the overall goal is removal/ wiping.
A. identify the root cause
Identifying the root cause of the incident is crucial because it allows you to understand how the incident occurred in the first place. By identifying the root cause, you can take steps to prevent similar incidents from happening in the future. This knowledge is essential for effective incident response and long-term security improvement.
from RSISecurity.com see the *** part
How to Remove Threats During the Eradication Phase of Incident Response
After identifying and analyzing the threats during the other incident phases, complete removal of those threats from your systems and periphery is the critical goal of the eradication phase.
To do so, choose the eradication approach that is most appropriate for the threat, such as:
Automated removal – If any minor threats can be removed by anti-malware tools, let the software remove them and focus on higher priority threats.
***Reimaging systems – Wipe systems and reimage them to ensure any malware is removed.
Applying patches – Patch vulnerabilities that may have facilitated attacks or been introduced by threats detected within the environment.
Migrating resources – Consider removing resources that weren’t affected during the incident to new systems to ensure they remain unaffected throughout the rest of the incident response process.
• Preparation: No organization can spin up an effective incident response on a moment’s notice. A plan must be in place to both prevent and respond to events.
• Detection and analysis: The second phase of IR is to determine whether an incident occurred, its severity, and its type.
• Containment and eradication: The purpose of the containment phase is to halt the effects of an incident before it can cause further damage.
• Post-incident recovery: A lessons learned meeting involving all relevant parties should be mandatory after a major incident and desirable after less severe incidents with the goal of improving security as a whole and incident handling in particular.
During the eradication phase, the incident response team investigates the extent of the compromise, identifies the root cause of the incident, and takes necessary actions to remove any malicious presence, unauthorized access, or compromised components from the affected systems or network. So the correct answer is Option A
Gonna go with D here - the root cause analysis should have been completed during the analysis phase, prior to containment. Hard to contain what you do not understand.
Option D- Since eradication step has to ensure the threat has been eliminated. All other options are not part of the eradication step.
A - Post-Op step, never seen anyone perform root cause in the middle of an active incident.
B - Recovery step. If performed without proper eradication then the incident can surface again.
C - Notifying the affected users would've already happened. Probably one of the first steps in Incident response.
Restoring from a backup, notifying affected users, and wiping the affected system are typically considered part of the containment and recovery phases of incident response, whereas identifying the root cause is a critical step in eradicating the incident and preventing its recurrence.
The correct answer is (A) identifying the root cause. This is cause you have to know what the root cause is in order to truly eliminate the threat. If it is not properly scoped then the attacker may still be able to log in or use another system to move throughout the environment.
Rationale:
(B) Restoring a system from a backup does nothing to address other potential points an attacker may hop from.
(C) notifying affected users without understanding the true scope of the incident may mislead users
(D) wiping the affected system only stops the attacker at this particular system, but not all the other systems that haven't been identified cause the root cause hasn't been identified yet.
ISACA: The eradication step of incident response involves direct actions (usually on the part of incident responders) to remove the source of the incident. This may include removing malware, blocking incoming and/or outgoing command and control messages, or removing an intruder.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
afb4b17
1Â month agoe891cd1
2Â months, 1Â week agoManix
5Â months, 3Â weeks agoFantasyDream
6Â months, 1Â week agojcisco123
6Â months, 2Â weeks agoJess20
7Â months, 2Â weeks agooluchecpoint
10Â months, 1Â week agoAgamennore
10Â months, 2Â weeks agosham222
12Â months agoDopy
12Â months agorichck102
1Â year agoSaisharan
1Â year, 1Â month agoGr3yGh0sT
1Â year, 2Â months agoDravidian
1Â year, 2Â months agocheesesteak
1Â year, 2Â months agodark_3k03r
1Â year, 3Â months agoCarlPTY07
1Â year, 4Â months ago