The organization shall provide on-demand audit review, analysis, and reporting for after-the-fact investigations of information/cybersecurity incidents.
The organization shall conduct forensic analysis on collected information/cybersecurity event information to determine root cause.