Incident Response Preparation Flashcards
Preparation
Detection and Analysis
Containment
Eradication and Recovery
Post-incident Activity
Incident Response Phases
The act of violating an explicit or implied security policy
Incident
Procedures and guidelines covering appropriate priorities, actions, and
responsibilities in the event of security incidents, divided into preparation,
detection/analysis, containment, eradication/recovery, and post-incident stages
Incident Response Procedures
Preparing for an incident response involves documenting your procedures,
putting resources and procedures in place, and conducting training
Make the system resilient to attack by hardening systems, writing policies and
procedures, and setting up confidential lines of communication
Preparation
Determine if an incident has place, triage it, and notify relevant stakeholders
Detection and Analysis
Limit the scope and the magnitude of the incident by securing data and the
limiting impact to business operations and your customers
Containment
Limit the scope and the magnitude of the incident by securing data and the
limiting impact to business operations and your customers
Limit the scope and the magnitude of the incident by securing data and the
limiting impact to business operations and your customers
Analyze the incident and responses to identify whether procedures or systems
could be improved
Post-incident Activity
Data breaches involved private or confidential data usually take priority over other
incidents
Data Criticality
Data that can be used to identify, contact, or impersonate an individual
Personally Identifiable Information (PII)
Information about a subject’s opinions, beliefs, and nature that is afforded
specially protected status by privacy legislation
Sensitive Personal Information (SPI)
Information that identifies someone as the subject of medical records, insurance
records, hospital results, or laboratory test result
Personal Health Information (PHI)
Data stored about bank accounts, investment accounts, payroll, tax returns, credit
card data, and other data about commercial transactions
Payment Card Industry Data Security Standard (PCI DSS) defines the safe handling
and storage of payment card data
Financial Information
Information created by an organization, usually about the products or services
that it makes or provides
Intellectual Property
Confidential data owned by a company like product, sales, marketing, legal, and
contract information
Corporate Information
An information system that processes data critical to a mission essential function
High Value Assets
The team must have a secure method of communication for managing incidents
Communication Plan
Signals that are sent between two parties or two devices that are sent via a path
or method different from that of the primary communication between the two
parties or devices
Out-of-band Communication
Notifications that must be made to affected parties in the event of a data breach,
as required by legislation or regulation
Reporting Requirements
There are 5 distinct types of breaches
Data Exfiltration
Insider Data Exfiltration
Device Theft/Loss
Accidental Data Breach
Integrity/Availability Breach
An attacker breaks into the system and transfers data to another
system
Data Exfiltration
An employee or ex-employee with privileges on the system transfers
data to another system
Insider Data Exfiltration
A device, such as a smartphone or laptop, containing data is lost or
stolen
Device Theft/Loss
Public disclosure of information or unauthorized transfer caused by
human error or a misconfiguration
Accidental Data Breach
Corruption of data or destruction of a system processing data
Integrity/Availability Breach
An incident response will require coordination between different internal departments
and external agencies
Response Coordination
Executives and managers who are responsible for business operations and
functional areas
Senior Leadership
Governmental organizations that oversee the compliance with specific regulations
and laws
Regulatory Bodies
The business or organization’s legal counsel is responsible for mitigating risk from
civil lawsuits
Legal
May provide services to assist in your incident handling efforts or to prepare for
legal action against the attacker in the future
Law Enforcement
Used to ensure no breaches of employment law or employee contracts is made
during an incident response
Human Resources (HR)
Used to manage negative publicity from a serious incident
Public Relations (PR)
Education to ensure employees and staff understand processes, procedures, and
priorities during an incident response
Training
Practical exercising of incident response procedures
Testing
Exercise that uses an incident scenario against a framework of controls or a red
team
Tabletop Exercise (TTX)
A red team attempts to conduct an intrusion of the network using a specific
scenario based on threat modeling
Penetration Test