Module 1: Security Incident Response Overview and Data Visualization Flashcards
What is the Overarching goal of Security Incident Response
Containment as soon as possible
The objective of the SIR process is to increase the speed of what 3 things
- Detection
- Containment
- Resolution
What are the four levels of the Security Incident Response Maturity Model?
0 - Manual Operations
1 - Basic Operations
2 - Automated Investigations
3 - Orchestrated Remediation
What occurs at level 0 (Manual Operations) of the SIR Maturity Model?
- Using spreadsheets for tracking and email/calls/texts for comms
- No centralized system for security response. This leads to limited visibility and long reponse times
What occurs at level 1 (Basic Operations) of the SIR Maturity Model?
- Security Incident and Tracking in a system with basic SIEM ingestion
- Incident Response for core processes defined and documented but incidents progress manually (no automation)
- Email parsing or advanced phising import
- Users and groups for assignment defined
- Risk calculator set up for prioritization
- Basic dashboards (non-PA)
- Basic SLAs in place
What occurs at level 2 (Automated Investigations) of the SIR Maturity Model?
- Security incidents are automatically enriched with threat intelligence data from third party sourcse
- Deduplication of alerts with Event Management
- SOC performance monitoring
- Top 3 playbooks implemented
What occurs at level 3 (Remediate with Orchestration) of the SIR Maturity Model?
- Orchestration for sightings searches, EDR, and firewall in place
- Ability to rapidly build custom integrations and create new integration workflows
- Top 7 playbooks implemented
- Advanced threat intelligence program
SIR Adoption Journey
What are the three levels in the SIR Customer Journey Maturity Model as specified by the ServiceNow Security Operations Business Unit?
() are the value from each level
- Modernize (Faster Security Response)
- Transform (Improved Situational Awareness)
- Innovate (Enterprise Protection)
What are the six steps defined in each level of the SIR Customer Adoption Journey
The three levels are:
Modernize
Transform
Innovate
- Inventory
- Connect
- Configure
- Launch
- Measure
- Refine
What are the four phases of the Incident Response Lifecycle which originate from NIST?
National Institute of Standards and Technology
- Preparation
- Customer org is properly trained
- Customer has defined business requirements (define a Security Incident, Priorities, etc.)
- Have already developed response plans with runbooks
- Detection and Analysis
- Detection originates from tools such as Firewalls, Intrusion Detection Systems, logs of email or web gateways
- Analysis is mainly a manual process (security analysts working the incident)
- Containment, Eradication, and Recovery
- Containment limits impact (disconnet CI from network for example), preventing data lass or further contamination
- Eradication attempts to fix based on best course of action, usually guided by runbooks and established processes
- Recovery brings affected systems back into normal operation
- Post Incident Activity
- Documentaion of observations along with actions taken and proposed future changes
- Saved as knowledge
Though not defined in ITIL (hard to believe but that’s what it says), ServiceNow defines a Security Incident as what
An incident created to address an event that can be related to either a security threat or security vulnerability. These are often attributable to a human root cause
What is included in basic Reporting:
- Provides real-time analysis of the current situation
- Many different (and familiar) graphs available baseline
- Several reports can be arranged on homepages such as the CISO Reporting Overview homepage
- Requires read access to the underlying table data
What is included with Performance Analytics?
- Provides real-time analysis of historical data (scheduled job records previous data over time)
- Analytics features can also provide trend lines and future prediction with confidence intervals
- Several widgets can be arranged on dashboards, e.g. CISO Overview dashboard
- Requires read access to the underlying table data
- Indicators can compare current data against targets
- Triggers can fire against specific thresholds being met
What are Indicators and what are the two main types
Indicators (sometimes known as business metrics) are statistics used to track and measure current conditions and forecast business trends
The two main types (these are generic and not just in PA) are:
Leading indicators which focus on the input required to achieve an objective
Lagging indicators which measure activity output