A ransomware attack encrypts multiple servers, including systems that store financial transaction data. Management activates the disaster recovery plan to restore from clean backups and resume business operations as quickly as possible. Meanwhile, law enforcement and internal investigators request that the affected systems remain offline to preserve evidence for criminal prosecution.
What is the BEST course of action?
A. Prioritize rapid system recovery and resume operations immediately using backups to meet RTO objectives.
B. Delay full recovery until investigators complete forensic imaging and evidence collection.
C. Restore essential systems first, while creating verified forensic images of compromised hosts before reinitialization.
D. Refuse to proceed with any restoration until the court issues a warrant authorizing evidence handling.