IH Flashcards
What two documents should your IR plan hook into?
COOP, DR
Any observable occurrence on a system or network
an event
Examples of events
Anything that you can show happened. (measurable)
System boot sequence
A system crash (could be normal behavior)
Packet flooding (could be legit, bursty apps)
Six stages of incident handling
Grand Master PI-CERL Preparation Identification Containment Eradication Recovery Lessons Learned
Places to share incident information?
BUGTRAQ (securityfocus.com)
Internet Storm Center (isc.com)
Dshield sensor network, part of SANS
Reviewing contingency plans, DR plans, and testing the technology and user base (phishing) that protect systems/networks from incidents is done during what phase?
Preparation
Warning banners NEED to include what?
- Consent to monitoring the use of its networks and systems
- Prohibits unauthorized access, use, or modification of resources
- If monitoring reveals evidence of criminal activity, the company can provide records to law enforcement.
Privacy laws can impact the ability of incident responders to
Effectively monitor and record system activity. Can be a problem in Europe.
What are some of the broad reasons you may be obligated to notify law enforcement for an incident?
- Threat to public safety or health
- Substantial impact to a third party
- Legal requirement for your industry
What types of protected data may require notifying the public when breached?
PII, PHI
What is your obligation to provide evidence to Law enforcement as part of THEIR investigation?
None, without a court order; have to balance need to conduct YOUR investigation, with theirs.
(Without any evidence, you’ll significantly hinder their investigation)
What SANS resource is available to help with law enforcement coordination?
SANS SCORE (sans.org/score/law-enforcement-faq)
Smart practice for policy on employees connecting remotely
Make sure the VPN banner includes a consent for remote search by the org.
How to get management buy in for IR capabilities
- Have a formal plan (with “peer” reporting measures)
- Provide monthly or quarterly reports
- Graphically illustrate incidents (cartoons, easy to understand stuff)
- Collect historical support
- Get news articles on similar incidents and how they were handled
Membership of a good IR team should include
Physical Security Infosec Legal HR DR BCP
two key items for benchmarking and recovering systems
- A system specific (desktop, file server, app server) build plan/doc
- A windows image backup of these that can be diffed against an infected machine
Your incident handling team construction should have what pyramid-like scheme?
An emergency communications plan and on-site team construction.
Similar to a command post; identify who is the engagement lead, who is handling which remote site/function, and what the comms plan is. (and backups are)
What is important to hammer out regarding procurement before beginning an IR activity?
A) What the procurement permission looks like; what happens if something (like an extra H/D) needs to be procured on site (how to make govt purchase card decisions)
and
B) What the secured communications plan is?
B) What is the plan for food/lodging/etc in case of the engagement going longer than expected?
Top two training issues for IR responders
- Creating forensic images under fire
2. Keyboard skills under fire
Some tricks for training the IR team
Internal honeypots
“War games” (Surprise pen tests)
Quick “drills” for creating images or finding specific log files
Great tool for performing large-scale incident response and hunt team communication/coordination.
Why is this tool good?
GRR, by google. Free.
- Works with Rekall,
- can pull relevant data asyncronously as hosts come on and off network. (helps w/Laptops and mobile)
- Can use “flows” (Scripts that run on the server but execute tasks on a host, such as looking for a file with a specific hash)
Contents of a good “jump bag” (Flyaway kit)
- Fresh/blank media
- Evidence collection suite (DD, Imager)
- Forensics tools (SIFT, EnCase, Flare, etc)
- Network Taps/Montiors
- EVery type of network/connection cable
- PC repair toolkit
- Extra copy of forms
_____ should be set as the incident handler(s), and they should have ___ for tasking.
one person, usually with a helper…..with a discrete set of events on a specifically scoped system to look at.
Why should you control information/need to know for an incident?
Details change quickly
incomplete or inaccurate details could get posted online
Folks who are “in the know” might have to testify, and will have an incomplete set of information
Insider threats can be tipped off