A tester is finishing an engagement and needs to ensure that artifacts resulting from the test are safely handled. Which of the following is the best procedure for maintaining client data privacy?
At the end of a penetration test, handling sensitive data properly ensures compliance with legal, regulatory, and ethical guidelines.
Securely destroy or remove all engagement-related data (Option B):
Ensures confidentiality of test results.
Prevents unauthorized access to client information.
Methods include secure wiping tools (shred, sdelete), and encrypted storage deletion.
Incorrect options:
Option A (Remove configuration changes): Necessary but does not ensure complete data destruction.
Option C (Search for sensitive credentials): Important but does not address all artifacts.
Option D (Shut down C2 infrastructure): Important for OPSEC but does not address client data privacy.
Currently there are no comments in this discussion, be the first to comment!