After a security incident that involved data exfiltration, which type of documentation should be generated to summarize the event's details, impact, methods of detection, response actions, and recommendations for future prevention?
Service Level Agreement (SLA)
Asset Inventory Report
Network Topology Diagram
User Activity Log
Incident Report
Change Management Log