IR-4(12): Malicious Code and Forensic Analysis

Control Family:

Incident Response

CSF v2.0 References:


(Not part of any baseline)

Info icon.

Control is new to this version of the control set.

Control Statement

Analyze malicious code and/or other residual artifacts remaining in the system after the incident.

Supplemental Guidance

When conducted carefully in an isolated environment, analysis of malicious code and other residual artifacts of a security incident or breach can give the organization insight into adversary tactics, techniques, and procedures. It can also indicate the identity or some defining characteristics of the adversary. In addition, malicious code analysis can help the organization develop responses to future incidents.