After containing a ransomware attack, an organization begins restoring critical systems from clean backups. Forensic analysis confirms that the malware has been removed and backups were not compromised. However, the incident response team warns that some security weaknesses that allowed the initial compromise may still exist. What should the organization do as part of the recovery phase of incident management?
A. Restore all affected systems immediately to resume operations and investigate the root cause after services stabilize.
B. Keep affected systems offline until the incident report is completed and approved by executive management.
O c. Reconnect restored systems to the production network while monitoring them for abnormal activity.
D. Validate system integrity and strengthen controls before returning restored systems to normal production operations.