(9) Incident Response Building Flashcards

1
Q

When building an incident response program, what does the policy need to look like?

A

The incident response policy is the base of the incident response program. It should be written in such a way to be timeless and provide authority for proper response.

It should assign responsibility to the CSIRT and describe the role of individual users and state authorities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What should the incident response policy NOT include?

A

The incident response plan should NOT include specific technologies, procedures, or evidence gathering techniques. It is because these details will change and should be included in documents that are more easily changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Summarize the key elements that NIST says should be in the infosec policy

A

It should have a statement of management commitment including purpose and objectives of the policy, scope, definition of terms, org structure, prioritization assignments and reporting apparatus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do incident response procedures outline and what should they include/look like?

A

Procedures provide specific information that CSIRT members need when responding to an incident. It has collective wisdom of other experts that has been collected during peaceful times to use during an incident.

A playbook or playbooks may be developed with specific processes that are to follow if/when an incident is deemed to have happened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of a rare instance when a playbook shouldn’t be followed during an incident response process?

A

A rare instance where a playbook can be deviated from would be based on the responders own professional judgement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When the CSIRT is developing the incident response plan, what should they pay attention to?

A

The CSIRT should pay particular attention to creating tools that may be useful during an incident response. These tools should provide guidance to response teams that can be read quickly and interpreted during a crisis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What types of people should be on the CSIRT?

A

The people who should be on the team involve cybersecurity professionals with specific skill sets but in larger companies this can also include security experts who step out of their normal duties to help a company after an incident has happened.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In addition to the regular team members, who else could/should be included in the CISRT?

A

The CSIRT may include subject matter experts, IT support staff, Legal counsel, Human Resources staff (to investigate internal threats) and public relations staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe the concept of an incident response provider

A

Incident response providers are useful if the org doesn’t have the necessary expertise in house to handle a particular incident or set of incidents. This is very expensive and should be considered carefully. The org needs to understand the providers delivery time frame on how fast the response will happen and when the provider would take over full control of the investigation if needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who should run the CSIRT?

A

The CSIRT should be run by a designated leader with clear authority to direct response efforts and serve as a middle man to management.

The leader should be a skilled incident responder who is assigned to lead the CSIRT or serves in a cybersecurity leadership position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe what the CSIRT scope of control should be?

A

The CSIRT has to have a defined scope of control. It needs to be decided as to what triggers the CSIRT, who is authorized to kick it into gear, if it is authorized to communicate with law enforcement, or other external parties, and if it has internal communicated or escalation responsibilities,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly