MD3 Incident detection and verification: The detection and analysis phase of the lifecycle Flashcards

1
Q

Detection and Analysis phase of the incident response lifecycle

A

This is where incident response teams verify and analyze incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Detection

A

Detection enables the prompt discovery of security events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Events

A

Remember not all events are incidents, but all incidents are events.

Events are regular occurrences in business operations, like visits to a website or password reset requests. IDS and SIEM tools collect and analyze event data from different sources to identify potential unusual activity. If an incident is detected, such as a malicious actor successfully gaining unauthorized access to an account, then an alert is sent out. Security teams then begin the Analysis phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Analysis

A
  1. Impossible to detect everything
  2. High volume alerts

Analysis involves the investigation and validation of alerts. During the analysis process, analysts must apply their critical thinking and incident analysis skills to investigate and validate alerts. They’ll examine indicators of compromise to determine if an incident has occurred. This can be a challenge for a couple of reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenges in detection and analysis phase

A

The challenge with detection is it’s impossible to detect everything. Even great detection tools have limitations in how they work, and automated tools may not be fully deployed across an organization due to limited resources. Some incidents are unavoidable, which is why it’s important for organizations to have an incident response plan in place.

Analysts often receive a high volume of alerts per shift, sometimes even thousands. Most of the time, high alert volumes are caused by misconfigured alert settings. For example, alert rules that are too broad and not tuned to an organization’s environment create false positives. Other times, high alert volumes can be legitimate alerts caused by malicious actors taking advantage of a newly discovered vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly