5.1/5.2 Flashcards
automation
involves generating a single task to run automatically without any human intervention
Automation could involve sending alerts to a security
information and event management (SIEM) system,
dynamically triggering a serverless function at a cloud
provider, or adding a record to a database when a
batch job is run
Orchestration
involves managing several or many
automated tasks or processes
orchestration (info)
As opposed to focusing on one task, orchestration combines all the individual tasks
Orchestration occurs with various technologies, applications, containers, datasets, middleware,
systems, and more
User and resource provisioning
Most modern
enterprises have tightly integrated Joiner and Mover
onboarding and provisioning processes that involve
automation between human resources, legal,
directory services, identity management (IdM), and
inventory engines
Guardrails
Cloud providers use JSON policies and Infrastructure as Code (IaC) to enforce least privilege policies and separation of duties to remove
certain application programming interface (API) calls from privileged groups and users
Security group firewalls
are layer 3/5 stateful packet
filters applied to either subnets or virtual instances
in hypervisors or cloud
Ticket creation and escalation
as part of a service
desk deployment will run scripts and automated
workflow:
* Software-defined networks (SD-LAN, SD-WAN, SDMAN)
benefits of automation
- Efficiency and productivity
- Time savings
- Enforcing baselines
- Standard infrastructure configurations
- Secure scalability
- Employee retention
- Reaction time
- Force multiplier
single point of failure (SPOF)
is a flaw in the design, configuration, or implementation
of the automation solution:
* If the automation solution is not redundant and
reliable, one loses the overall benefits
goals of incident response
Prevent the spread
Reduce the immediate impact
Protect and maintain ongoing operations
Support forensics, e-discovery, and
continuity of operations
Provide after-action reports and lessons learned
readication
Potentially unwanted programs (PUPs) can be eradicated by
advanced antivirus and antimalware suites
testing incident response
Plan review (read-through)
Tabletop
Walk-through (exercise)
Simulation
Parallel
Full interruption
Plan review (read-through):
- Group discussion, plan auditing, and Delphi and
brainstorming sessions with stakeholders
Tabletop:
- Documented plans, diagrams, and logical
and virtual walk-throughs to eliminate gaps/errors
Walk-through (exercise):
- Planned rehearsals and drills
- Performed in stages and by department/building only
- Should find additional gaps to those found during
plan review and tabletop exercises
Simulation:
- Focus on specific scenarios and areas
- Use real business continuity plan (BCP) and disaster
recovery plan (DRP) resources (recovery sites)
and teams (swarm simulations) - Test snapshot recovery and hot spares
- May be the highest-level test that most
organizations conduct
Parallel:
- Conduct a real-world drill while still operating
business - Is more resource-intensive than simulations
Full interruption:
- Conduct real-world drill while ceasing business
activities - Is cost-prohibitive for most organizations
Root cause analysis (RCA)
defined as a collective term that describes a wide range of approaches, tools, and techniques
used to uncover causes of problems
a function of the Problem Management IT
service practice
root cause
is defined as a factor that introduced a non-conformance in an application, service, or
system
RCA steps
define the problem
collect data
identify possible causal factors
identify the root causes
recommend and implement solutions
threat hunters
aka “hunt teams”
Involve groups of cyber investigators aggressively
seeking out threats on a network or system
Are often compliance or regulatory auditors
cyber kill chain
the succession of steps and phases used during a structured external or internal cyberattack
It is used by penetration testers and threat-hunting teams to better understand advanced persistent threats from exploits and malware attacks
why perform digital forensics?
- Laws have been violated
- Organizational policies have been violated
- Systems have been attacked
- Data and identity have been breached
- Intellectual property has been exfiltrated
- Privileged insiders are suspected of crimes
- It is the next incident response phase (root cause
analysis/problem management)
E-discovery
is innovative technology that has
emerged over the last decade to lower the risks and costs associated with big data, especially in litigation
and internal corporate and government investigations
The e-discovery process includes four phases:
- Identifying and collecting documents
- Sorting through data by relevance
- Creating production sets
- Managing data
order of volatility
- CPU and its cache
- Kernel statistics, tables, and caches
- Memory (RAM)
- Temporary file systems and swap/slack space
- Disk drives and volumes
- Attached removable drives
- Logged data to a remote location
- Copies of data to archived media/cloud
processing forensic evidence
- Detect encrypted files and volumes
- Discover compressed files and folders
- Perform validation and pattern matching
- Leverage regular expressions and metacharacters in forensic kits
- Filter for suspected user data
- Filter security identifiers (SIDs) on shared systems for privacy reasons
- Perform discovery of hidden data in slack space
- Extract only meaningful data
- Conduct traces and calibrated estimates to determine suspect(s)
chain of custody
ensures that the integrity of collected evidence remains intact in its original state
two important things of chain custody:
date and time the evidence is collected and the location of artifacts
chain of custody involves:
strict procedures for collecting,
handling, and tagging evidence
Provides a history and timeline of
evidence handling
chain of custody maintains, provides and prohibits what?
- Maintains evidence integrity
- Provides accountability
- Prohibits tampering
legal hold
a process that an organization uses
to retain all forms of pertinent data and information when it reasonably expects some type of litigation against it, or some need for future utility in a court of law
forensic reporting
Should have as much information as necessary but not a “data overload”
May need to express in simpler terms or have different reports for different target audiences
* Provide electronic and physical documents of all findings
* Meet with proper authorities and possibly prepare to offer expert testimony
* Provide any needed clarification
* Identify overall impact on business and recommend any countermeasures
* Answer who, what, when, and how – important for court and other proceedings
data source logs
firewall
application
endpoint
OS-specific
IPS/IDS
network
firewall
can provide traffic data in layer 2
frames up to deep packet application inspection
using different outputs
application
for email, web, SharePoint, file,
directory, database servers, and more
endpoint
such as Palo Alto Cortex XDR