ISC2 CISSP Practice Question
A security incident has occurred at your organization involving unauthorized access to sensitive customer data. As the lead security investigator, you have collected evidence from various systems and are now preparing your final investigation report. Which of the following elements is MOST important to include in your documentation?
Recommendations for disciplinary actions against employees
Personal opinions about who should be held responsible
Screenshots of system logs without timestamps
Chain of custody documentation for collected evidence