5.4 Follow incident response procedures Flashcards
Incident response plan
- Identify and prioritize all incidents that pose risk without overloading the security team.
- Re-establish a secure working system.
- Preserve evidence of the incident with the aim of prosecuting the perpetrators.
- Prevent reoccurrence of the incident.
Documented incident types/category definitions
- Data Integrity
- Downtime
- Economic/publicity
- Scope
- Detection time
- Recovery time
Roles and responsibilities
Some organizations will provide a dedicated cyber incident response team (CIRT) or computer security incident response team (CSIRT) as a single point-of-contact for the notification of security incidents.
Reporting requirements/escalation
The process by which more senior staff become involved in the management of an incident
Cyber incident response teams
(cyber incident response team) A group that handles events involving computer security breaches.
Preparation
Making the system resilient to attack in the first place. This includes hardening systems, writing policies and procedures, and establishing confidential lines of communication. It also implies creating a formal incident response plan.
Identification
Determining whether an incident has taken place and assessing how severe it might be, followed by notification of the incident to stakeholders.
Containment
Limiting the scope and impact of the incident. The typical response is to “pull the plug” on the affected system, but this is not always appropriate.
Eradication
Removing an incident from the system.
Lessons learned
Analyzing the incident and responses to identify whether procedures or systems could be improved. It is imperative to document the incident.