(9) Contain, Eradicate, Recover Flashcards

1
Q

What does the Computer Security Incident and Response Team (CSIRT) do during the Incident, Detection, and Analysis phase?

A

During the incident detection and analysis phase, CSIRT performs passive activities to uncover and analyze information about the incident. After assessing, the team moves on to more active activities to contain the effects of the incident and recover normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the high level goal of the CSIRT during the containment, eradication and recovery phase of the incident response process?

A
  1. Select a containment strategy that fits the situation
  2. Implement the containment strategy to limit damage causes by the incident
  3. Gather extra evidence needed to respond properly and possibly take legal action
  4. Identify the attackers and the systems that they use
  5. Stop the effects and recover normal business operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Once the incident is resolved, name the steps that security teams need to take during post incident activity

A

The CSIRT performs Forensic Analysis, Root cause Analysis, Lessons Learned review, and evidence retention During the post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

During post incident activity, what is forensic analysis?

A

Forensic analysis is about going through the large amount of data to figure out what happened and how the event occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During Post Incident Activity, what is root cause analysis?

A

Root cause analysis is about developing an understanding of the incidents root cause. This helps to also discover the controls that can prevent the same attack from happening again in the future

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During Post incident Activity, describe the lessons learned review process

A

During lessons learned review, responders do a full review of the incident and their response, if possible it should be a review where everyone is present for the discussion. Being live and present physically or virtually is important because it leads to very good insights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

According to NIST 800-61, who should be the one to lead the lessons learned review?

A

The one who should be involved in the post incident lessons learned review should be an independent facilitator who was not involved in the incident response and is an outside to those in attendance. This prevents people operating with an agenda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

During the post incident lessons learned review, what types of questions should be asked by the independent facilitator?

A

The facilitator should ask what happened, when did it happen, did the company respond well, could better steps be taken, what can be done to prevent it, and what resources are needed to support the prevention effort?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to post incident investigation, describe evidence retention

A

The leader of the investigation should discuss and work with staff to figure out internal and external evidence retention requirements. If legal action is involved, then the team should discuss what to retain with an attorney. If no evidence will be used in court, then data retention policies would need to be followed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly