Which principle is being followed when an analyst gathers information relevant to a security incident to determine the appropriate course of action?