4.2 IR Policies, Processes, and Procedures Flashcards
An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.
• User clicks an email attachment and executes malware
– Malware then communicates with external servers
• DDoS
– Botnet attack
• Confidential information is stolen
– Thief wants money or it goes public
• User installs peer-to-peer software and allows external
access to internal servers
Security incidents
Part of Incident Response Process - • Incident response team – Specialized group, trained and tested • IT security management – Corporate support • Compliance officers – Intricate knowledge of compliance rules • Technical staff – Your team in the trenches • User community – They see everything
IR - Roles and responsibilities
This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. • National Institute of Standards and Technology – NIST Special Publication 800-61 Rev. 2 – Computer Security Incident – Handling Guide • The incident response lifecycle: – Preparation – Detection and Analysis – Containment, Eradication, and Recovery – Post-incident Activity
NIST SP800-61
Part of Incident Response Process -
This phase will be the work horse of your incident response planning, and in the end, the most crucial phase to protect your business. Part of this phase includes:
- Ensure your employees are properly trained regarding their incident response roles and responsibilities in the event of data breach
- Develop incident response drill scenarios and regularly conduct mock data breaches to evaluate your incident response plan.
- Ensure that all aspects of your incident response plan (training, execution, hardware and software resources, etc.) are approved and funded in advance
Your response plan should be well documented, thoroughly explaining everyone’s roles and responsibilities. Then the plan must be tested in order to assure that your employees will perform as they were trained. The more prepared your employees are, the less likely they’ll make critical mistakes.
• Communication methods – Phones and contact information • Incident handling hardware and software – Laptops, removable media, forensic software, digital cameras, etc. • Incident analysis resources – Documentation, network diagrams, baselines, critical file hash values • Incident mitigation software – Clean OS and application images • Policies needed for incident handling – Everyone knows what to do
Preparing for an incident
Part of Incident Response Process -
This is the process where you determine whether you’ve been breached. A breach, or incident, could originate from many different areas. >>> Questions to address <<< When did the event happen? How was it discovered? Who discovered it? Have any other areas been impacted? What is the scope of the compromise? Does it affect operations? Has the source (point of entry) of the event been discovered?
• Many different detection sources
– Different levels of detail, different levels of perception
• A large amount of “volume”
– Attacks are incoming all the time
– How do you identify the legitimate threats?
• Incidents are almost always complex
– Extensive knowledge needed
The challenge of detection
Part of Incident Response Process -
• An incident might occur in the future – This is your heads-up • Web server log – Vulnerability scanner in use • Exploit announcement – Monthly Microsoft patch release, – Adobe Flash update • Direct threats – A hacking group doesn’t like you
Incident precursors
Part of Incident Response Process -
• An attack is underway
– Or an exploit is successful
• Buffer overflow attempt
– Identified by an intrusion detection/prevention system
• Anti-virus software identifies malware
– Deletes from OS and notifies administrator
• Host-based monitor detects a configuration change
– Constantly monitors system files
• Network traffic flows deviate from the norm
– Requires constant monitoring
Incident indicators
Part of Incident Response Process -
This phase, the incident response team begins interacting with affected systems and attempts to keep further damage from occurring as a result of the incident.
• Generally a bad idea to let things run their course
– An incident can spread quickly
– It’s your fault at that point
• Sandboxes
– An isolated operating system
– Run malware and analyze the results
– Clean out the sandbox when done
• Isolation can be sometimes be problematic
– Malware or infections can monitor connectivity
– When connectivity is lost, everything could be
deleted/encrypted/damaged
Isolation and containment
Part of Incident Response Process - This is the process of restoring and returning affected systems and devices back into your business environment. During this time, it’s important to get your systems and business operations up and running again without the fear of another breach. • Get things back to normal – Remove the bad, keep the good • Eradicate* the bug – Remove malware – Disable breached user accounts – Fix vulnerabilities • Recover the system – Restore from backups – Rebuild from scratch – Replace compromised files – Tighten down the perimeter
Recovery after an incident
Part of Incident Response Process -
• A phased approach
– It’s difficult to fix everything at once
• Recovery may take months
– Large-scale incidents require a large amount of work
• The plan should be efficient
– Start with quick, high-value security changes
• Patches, firewall policy changes
– Later phases involve much “heavier lifting”
• Infrastructure changes, large-scale security
rollouts
Reconstitution
Part of Incident Response Process - • Learn and improve – No system is perfect • Post-incident meeting – Invite everyone affected by the incident • Don’t wait too long – Memories fade over time – Some recommendations can be applied to the next event
Answer the tough questions
• What happened, exactly?
– Timestamp of the events
• How did your incident plans work?
– Did the process operate successfully?
• What would you do differently next time?
– Retrospective views provide context
• Which indicators would you watch next time?
– Different precursors may give you better alerts
Lessons learned
a Incident Response Planning- • Test yourselves before an actual event – Scheduled update sessions (annual, semi-annual, etc.) • Use well-defined rules of engagement – Do not touch the production systems • Very specific scenario – Limited time to run the event • Evaluate response – Document and discuss
Exercise
a Incident Response Planning-
• Performing a full-scale disaster drill can be costly
– And time consuming
• Many of the logistics can be determined through
analysis
– You don’t physically have to go through a
disaster or drill
• Get key players together for a tabletop exercise
– Talk through a simulated disaster
Tabletop exercises
a Incident Response Planning-
• Include responders
– A step beyond a tabletop exercise
– Many moving parts
• Test processes and procedures before an event
– Walk through each step
– Involve all groups
– Reference actual response materials
• Identifies actual faults or missing steps
– The walkthrough applies the concepts from the
tabletop exercise
Walkthrough
a Incident Response Planning- • Test with a simulated event – Phishing attack, password requests, data breaches • Going phishing – Create a phishing email attack – Send to your actual user community – See who bites • Test internal security – Did the phishing get past the filter? • Test the users – Who clicked? – Additional training may be required
Simulation