Which of the following actions is MOST crucial when beginning threat hunting efforts, focusing on the protection of assets vital to the company's core functionality?
Ensure that all systems are regularly updated to the latest security patches regardless of their business criticality.
Create a comprehensive inventory of all business-critical assets to ensure they are prioritized in hunting activities.
Continuously review access logs for all systems to immediately identify unauthorized access to business-critical assets.
Keep regular backups of all systems to quickly restore any compromised business-critical assets.
|Incident Response and Management
|Reporting and Communication