01. Incident Response Plan (386) Flashcards
Incident Management Readiness
Events that can disrupt the continuity and viability of an organisations;
- Natural Disasters
- Human-made disasters
- Malicious acts
- Cyberattacks
- Change with unintended consequences
286
Incident Management Readiness
Incident management readiness begins with upfront analysis of business processes and dependencies
386
Incident Response Plan
BCP and DRP share the common objective;
Best possible continuity of business operations during/after a disruptive event
386
Incident Response Plan
Business continuity response is required so business can operatie critical business processes without primary processing systems
386
Incident Response Plan
Disaster recovery planning is needed to recover systems and resume normal operations
386
Incident Response Plan
Connected devices often directly or indirectly relate to life safety. Life safety is included as a high priority in information securtiy
387
Incident Response Plan
Risk assessments are the foundation of planning for security incident responses, business continuity planning, and disaster recovery planning
387
Security Incident Response
As a result of a security incidents, the confidentiality, integrity, or availability of information systems has been or is in danger of being compromised
388
Types of security incidents;
Computer account abuse
Willful account abuse, sharing credentials etc.
Computer or network trespass
Unauthorised access to computer network
Information exposure or theft
Protected information still exposed to unauthorized people
Malware
Worm or virus outbreak that disrupts business operations
Ransomware and wipeware
Data encryption for ransom, exfiltration of data and threat of posting publically, or destroying data instead of encrypting it
Denial-of-Service (Dos)
Attacks flood target network with data to overwhelm it
Distributed Denial-of-Service (DDoS)
Similar to DoS but emanating from hundreds of thousands of computers at one time.
Encryption or Destruction of Critical information
The results of a ransomware or wiper attack
Disclosure of sensitive information
Sensitive information disclosed to unauthorised party
Information System Theft
Laptop, mobile, other information processing or storage equipment stolen
Information System Damage
Human intruder or malware causing temporary or irreversible damate to information systems
Information Corruption
Damage to information stored on systems.
Misconfiguration
Errors by IT workers resulting in data loss
Sabotage
Disruptive or damaging processes to an organisation or several organisations by human or malware with intent
Intrusion Kill Chain
Lockheed-Martin model depicting typical computer intrusion;
- Reconnaissance
- Weaponisation
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objective
390
Incident Response Plan Development
A security manager must first thoroughlly understand organisation business processes and information systems
390
Security manager may first develope a high-level incident response plan
Incident Response Plan Development - Objectives
Organisations must establish objectives before developing a security incident response place to know if business needs are being met
390
Resources
Incident response stages from detection to closure require personnel with different skill sets, including;
- Incident detection and response
- Network, system, application SMEs
- Malware analysis and reverse engineering
- Forensics
- Incident command and control
- Crisis communications
- Legal / Privacy
- Business Unit Leaders
- Executives
- Law Enforcement
392
Outsourcing
Organisations opt to utilize forensic experts on demand or contract basis
392
Gap Analysis
A securtiy manager must determine the current state of the organisations incident response capabilities, and the desired state. Best method is to use a gap analysis
393
Security Incident Plan Development
A securtiy incident response plan is a document that defines policies, roles, responsibilities, and actions to be taken in event of a security incident
393
Security incident response plan typically includes;
Policy
Roles and Responsibilities
Incidwent Detection Capabilities
Playbooks
Communications
Recordkeeping