Domain 9 - Incident Response Flashcards
1
Q
What are the four stages of IR plan?
A
- Preparation
- Detection and Analysis
- Containment, Eradication & Recovery
- Post Mortem.
2
Q
What is involved in the Preparation stage of IR?
A
- Process to handle incidents
- Who’s who - IR manager, team
- Documentation (arch diagram, network IP addresses and ports)
- Training
- Vulnerability assessment
- Third party threat intel
3
Q
What is involved in the detection & analysis stage of IR?
A
- Alerting (endpoint protection, host monitoring, network security monitoring, anomaly detection)
- Validating alerts
- Estimating the scope of the incident
- Assigning an incident manager
- Understanding timeline of attack.
- Notification and coordination
4
Q
What is involved in the containment & eradication stage of IR?
A
- Taking systems offline
- clean up compromised devices, restore from backup
5
Q
How does the cloud impact the preparation stage of IR?
A
- SLAs have to be agreed upon with CSP.
- Understand what data and logs are available for incident management
- Prepare tools to do remote investigation (understand what VM images, disk storage are available)
- Architect appropriately - e.g. turn on CT logs, store logs, architect for isolation using VPCs, use immutable servers,
- Do Threat Modeling and Gamedays
6
Q
How does the cloud impact the Detection & Analysis stage of IR?
A
- Monitoring must cover both the assets and the management plane
- Leverage in-cloud monitoring and automation workflows (e.g. usage metrics, lambda functions)
- Use Cloud Logs (CT, CW)
- Understand logging gaps (.e.g serverless and auto scaling)
- Is Cloud Provider activities logged?
- Network logs (e.g. VPC flow logs) may not be packet captures
- Understand chain of custody
- Forensics and investigative support must be cloud-native
- Automate - e.g. snapshot VM images, capture metadata, pause VMs to preserve volatile memory
- Examine configuration data, data access logs, management plane logs
7
Q
How does the cloud impact the Containment & Recovery stage of IR?
A
- Leverage cloud capabilities to isolate the infected components (e.g. remove infected VM out of an auto-scaling group and isolate it using an SG.