The last part of the incident response plan is reporting the
incident. The security team should take notes as the response is
happening and report all issues to organizations such as local and
federal authorities or multi-vendor software vulnerability portals,
such as the Common Vulnerabilities and Exposures site (CVE) at
https://cve.mitre.org/. Depending on the type of legal
counsel an enterprise employs, a post-mortem analysis may be
required. Even if it is not a functional requirement to a
compromise analysis, a post-mortem can prove invaluable in helping
to learn how a cracker thinks and how the systems are structured so
that future compromises can be prevented.