ISC2 CISSP Practice Question
A security incident has occurred at your organization involving unauthorized access to sensitive customer data. As the lead security investigator, you have collected evidence from various systems and are now preparing your final investigation report. Which of the following elements is MOST important to include in your documentation?
Screenshots of system logs without timestamps
Recommendations for disciplinary actions against employees
Personal opinions about who should be held responsible
Chain of custody documentation for collected evidence