An analyst detects unusual outbound traffic from a server storing customer PII, suggesting potential data exfiltration. According to the NIST incident response lifecycle, what is the IMMEDIATE next step after this initial detection?
-
A
Notify the affected data subjects and regulatory authorities.
-
B
Isolate the server from the network to prevent further data loss.
-
C
Analyze the event to understand its scope, nature, and impact.
-
D
Deploy a patch to the vulnerability that allowed the unauthorized access.