From the course: CompTIA Security+ (SY0-601) Cert Prep: 9 Operations and Incident Response

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Validation

Validation

- [Instructor] Eradication and recovery processes are complex, and they require different activities, depending upon the nature of the compromise. Therefore, it's very important that you validate your work, before declaring an incident resolved. Validation is the final activity that you should undertake during the containment, eradication, and recovery phase, before moving on to post-incident activities. Let's take a look at the activities that should take place during validation. First, check the security of every system on your network, with a particular focus on those that were involved in the compromise. Now that might sound like a tremendous amount of work, but you can automate this with the help of configuration management tools. You'll want to pay particular attention to ensuring that all of your systems are patched with current security updates and they're protected against known vulnerabilities. In addition to…

Contents