During a major security incident, analysts determine that an attacker gained access through a compromised third-party API used by several internal applications. The organization has contained the affected systems and begun restoring from backups.
According to proper incident response procedures, what should the security team do NEXT?
A. Notify law enforcement of the breach and provide forensic evidence.
B. Perform a lessons-learned review to identify control gaps and process improvements.
C. Conduct a full forensic analysis to confirm the attack vector and scope of compromise.
D. Resume normal operations once all backups are verified and systems are restored.