A security alert was triggered when an end user tried to access a website that is not allowed per organizational policy. Since the action is considered a terminable offense, the SOC analyst collects the authentication logs, web logs, and temporary files, reflecting the web searches from the user's workstation, to build the case for the investigation. Which of the following is the best way to ensure that the investigation complies with HR or privacy policies?
A. reate a timeline of events detailing the date stamps, user account hostname and IP information associated with the activities
B. nsure that the case details do not reflect any user-identifiable information Password protect the evidence and restrict access to personnel related to the investigation
C. reate a code name for the investigation in the ticketing system so that all personnel with access will not be able to easily identify the case as an HR-related investigation
D. otify the SOC manager for awareness after confirmation that the activity was intentional