Chapter 14 - Monitoring and Incident Response Flashcards
Incident
An Incident is a violation of the organization’s policies and procedures or security practices.
Event
An Event is an observable occurrence, meaning that there are many events, few of which are likely to be incidents.
What are the six steps of the incident response cycle?
- Preparation
- Detection
- Containment
- Eradication
- Recovery
- Lessons Learned
Tabletop Exercise
Tabletop Exercises are used to talk through processes. Team members are given a scenario and are asked questions about how they would respond, what issues might arise, and what they would need to do to accomplish the tasks they are assigned in the (Incident Response) IR plan.
Simulation
Simulation exercises will simulate incidents and test responders on individual functions or elements of the incident response plan. They can also be done at full scale, involving the entire organization in the exercise.
Account Lockout (IoC)
Account Lockout is often due to brute-force login attempts or incorrect passwords used by an attacker.
Concurrent Session Usage (IoC)
Concurrent Session Usage is when a user is connected from more than one system or device at once, specifically when the second device is in an unexpected or uncommon location.
Resource Consumption (IoC)
Resource Consumption, like filling up a disk or using more bandwidth than usual for uploads or downloads, can be an indicator of compromise.
Out-of-Cycle Logging (IoC)
Out-of-Cycle Logging occurs when an event that happens at the same time or on a set cycle occurs at an unusual time. This might be a worker logging in at 2AM or a cleanup process being activated at an unusual time.
Missing Logs (IoC)
Missing Logs may indicate that an attacker has wiped the logs to attempt to hide their actions. This is one reason that many organizations centralize their log collection on a protected system.
MITRE’s ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge)
The ATT&CK knowledgebase matrices include detailed descriptions, definitions, and examples for the complete threat life cycle from reconnaissance through execution, persistence, privilege escalation, and impact.
System Monitoring
System Monitoring is typically done via system logs as well as through central management tools, including those found in cloud services.
Application Monitoring
Application Monitoring may involve application logs, application management interfaces, and performance monitoring tools. This can vary significantly based on what the application provides.
Infrastructure Monitoring
Infrastructure Monitoring includes monitoring SNMP and syslog entries created by infrastructure devices.
Security Information and Event Management (SIEM)
SIEM devices and software have broad security capabilities, which are typically based on the ability to collect and aggregate log data from a variety of sources and then to perform correlation and analysis activities with that data.