||Immediately following incident recovery, Service Providers, Network Operators, and Public Safety should re-evaluate the adequacy of existing security architecture and implement revisions as needed.
||Service Provider; Network Operator
||Cyber Security;Intrusion Detection;Network Design;Network Operations;Procedures;
|| Ensure any changes are adequately documented to reflect the current configuration. Review existing processes for establishing and maintaining security architectures update as necessary to maintain currency.