Module 4 - 02-1 Flashcards

Phases of incident response playbooks

1
Q

Define Playbook

A

A manual that provides details about any operational action,

clarify what tools should be used in response to a security incident,

and ensure that people follow a consistent list of actions in a prescribed way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statements are true about playbooks? Select three answers.

  • Playbooks clarify what tools should be used to respond to security incidents.
  • Playbooks categorize and analyze large amounts of data to help security teams identify risk.
  • Playbooks are manuals that provide details about any operational action.
  • Playbooks ensure that people follow a consistent list of actions in a prescribed way.
A
  • Playbooks clarify what tools should be used to respond to security incidents.
  • Playbooks are manuals that provide details about any operational action.
  • Playbooks ensure that people follow a consistent list of actions in a prescribed way.

Playbooks are manuals that provide details about any operational action, clarify what tools should be used, and ensure people follow a consistent list of actions to address security incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Living document

A

They are frequently updated by security team members to address industry changes and new threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When how often would a playbook be updated (3)?

A
  • A failure is identified, such as an oversight in the outlined policies and procedures, or in the playbook itself.
  • There is a change in industry standards, such as changes in laws or regulatory compliance.
  • The cybersecurity landscape changes due to evolving threat actor tactics and techniques.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is are common playbooks used in cybersecurity?

A
  • Incident response playbooks
  • Vulnerability response playbooks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Incident response

A

An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Incident response playbook?

A

A guide with phases used to help mitigate and manage security incidents from beginning to end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How many phases does incident response playbook have?

A

Six (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the incident response playbook phases?

A

1) Preparation
2) Detection and analysis
3) Containment
4) Eradication and recovery
5) Post incident activity
6) Coordination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the (1st) first phase of an incident response playbook?

A

1) Preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the (2nd) second phase of an incident response playbook?

A

2) Detection and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the (3rd) third phase of an incident response playbook?

A

3) Containment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the (4th) fourth phase of an incident response playbook?

A

4) Eradication and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the (5th) fifth phase of an incident response playbook?

A

5) Post incident activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the (6th) sixth phase of an incident response playbook?

A

6) Coordination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain the Preparation phase of an incident response playbook

A

Organizations must prepare to mitigate the likelihood, risk, and impact of a security incident by documenting procedures, establishing staffing plans, and educating users.

Preparation sets the foundation for successful incident response.

17
Q

Explain the Detection and Analysis phase of an incident response playbook

A

The objective of this phase is to detect and analyze events using defined processes and technology.

Using appropriate tools and strategies during this phase helps security analysts determine whether a breach has occurred and analyze its possible magnitude.

18
Q

Explain the Containment phase of an incident response playbook

A

The goal of containment is to prevent further damage and reduce the immediate impact of a security incident.

During this phase, security professionals take actions to contain an incident and minimize damage. Containment is a high priority for organizations because it helps prevent ongoing risks to critical assets and data.

19
Q

Explain the Eradication and Recovery phase of an incident response playbook

A

This phase involves the complete removal of an incident’s artifacts so that an organization can return to normal operations.

During this phase, security professionals eliminate artifacts of the incident by removing malicious code and mitigating vulnerabilities. Once they’ve exercised due diligence, they can begin to restore the affected environment to a secure state. This is also known as IT restoration.

20
Q

Explain the Post Incident Activity phase of an incident response playbook

A

This phase includes documenting the incident, informing organizational leadership, and applying lessons learned to ensure that an organization is better prepared to handle future incidents.

Depending on the severity of the incident, organizations can conduct a full-scale incident analysis to determine the root cause of the incident and implement various updates or improvements to enhance its overall security posture.

21
Q

Explain the Coordination phase of an incident response playbook

A

Coordination involves reporting incidents and sharing information, throughout the incident response process, based on the organization’s established standards.

Coordination is important for many reasons. It ensures that organizations meet compliance requirements and it allows for coordinated response and resolution.

22
Q

Define Business continuity plan

A

An established path forward allowing a business to recover and continue to operate as normal, despite a disruption like a security breach

23
Q

What is a basic formula for determining the level of risk?

A

Risk equals the likelihood of a threat

24
Q

In the event of a security incident, when would it be appropriate to refer to an incident response playbook?

  • Only when the incident first occurs
  • At least one month after the incident is over
  • Throughout the entire incident
  • Only prior to the incident occurring
A

Throughout the entire incident

In the event of a security incident, it is appropriate to refer to an incident response playbook throughout the entire incident. An incident response playbook is a guide with six phases used to help mitigate and manage security incidents from beginning to end.

25
Q

During the _____ phase, security professionals use tools and strategies to determine whether a breach has occurred and to evaluate its potential magnitude.

  • coordination
  • containment
  • preparation
  • detection and analysis
A

detection and analysis

26
Q

In which incident response playbook phase would a security team document an incident to ensure that their organization is better prepared to handle future security events?

  • Eradication and recovery
  • Post-incident activity
  • Containment
  • Coordination
A

Post-incident activity

In the post-incident activity phase, a security team documents an incident to ensure that their organization is better prepared to handle future incidents.

27
Q

What is the relationship between SIEM tools and playbooks?

  • Playbooks detect threats and generate alerts, then SIEM tools provide the security team with a proven strategy.
  • Playbooks collect and analyze data, then SIEM tools guide the response process.
  • They work together to predict future threats and eliminate the need for human intervention.
  • They work together to provide a structured and efficient way of responding to security incidents.

SIEM tools and playbooks work together to provide a structured and efficient way of responding to security incidents.

A

They work together to provide a structured and efficient way of responding to security incidents.

SIEM tools and playbooks work together to provide a structured and efficient way of responding to security incidents.