IR-4(12): Malicious Code and Forensic Analysis
CSF v1.1 References:
(Not part of any baseline)
Control is new to this version of the control set.
Analyze malicious code and/or other residual artifacts remaining in the system after the incident.
When conducted carefully in an isolated environment, analysis of malicious code and other residual artifacts of a security incident or breach can give the organization insight into adversary tactics, techniques, and procedures. It can also indicate the identity or some defining characteristics of the adversary. In addition, malicious code analysis can help the organization develop responses to future incidents.