Module 6 - Incident Response Flashcards
Incident response
Incident Response involves the methods, policies, and procedures that are used by an organisation to respond to a cyberattack. The aims of incident response are to limit the impact of the attack, assess the damage caused, and implement recovery procedures. Because of the potential large-scale loss of property and revenue that can be caused by cyberattacks, it is essential that organisations create and maintain detailed incident response plans and designate personnel who are responsible for executing all aspects of that plan.
NIST 800-61r2
The NIST 800-61r2 standard provides guidelines for incident handling, particularly for analysing incident-related data, and determining the appropriate response to each incident. The guidelines can be followed independently of particular hardware platforms, operating systems, protocols, or applications.
CSIRC
Computer Security Incident Response Capability
To establish and maintain a CSIRC, NIST recommends creating:
- Policies
- Plans
- Procedures
Policy Elements
An incident response policy details how incidents should be handled based on the organisation’s mission, size, and function and should be reviewed regularly to adjust to the goals of the organisation’s roadmap.
Policy elements include the following:
- Statement of management commitment
- Purpose and objectives of the policy
- Scope of the policy
- Definition of computer security incidents and related terms
- Organisational structure and definition of roles, responsibilities, and levels of authority
- Prioritisation of severity ratings of incidents
- Performance measures
- Reporting and contact forms
Plan Elements
A good incident response plan helps to minimise damage caused by an incident. It also helps to make the overall incident response program better by adjusting it according to lessons learned. It will ensure that each party involved in the incident response has a clear understanding of not only what they will be doing, but what others will be doing as well.
Plan elements are as follows:
- Mission
- Strategies and goals
- Senior management approval
- Organisational approach to incident response
- How the incident response team will communicate with the rest of the organisation and with other organisations
- Metrics for measuring the incident response capacity
- How the program fits into overall organisation
Procedure Elements
The procedures that are followed during an incident response should follow the incident response plan.
Procedures elements are as follows:
- Technical processes
- Using techniques
- Filling out forms
- Following checklists
These are typical standard operating procedures (SOPs). These SOPs should be detailed so that the mission and goals of the organisation are in mind when these procedures are followed. SOPs minimise errors that may be caused by personnel who are under stress while participating in incident handling.
It is important to share and practice these procedures, making sure that they are useful, accurate, and appropriate.
Incident Response Stakeholders
- Management
- Information Insurance
- IT Support
- Legal Department
- Public Affairs and Media Relations
- Human Resources
- Business Continuity Planners
- Physical Security and Facilities Management
CMMC
The Cybersecurity Maturity Model Certification (CMMC) is a framework developed to evaluate and enhance the cybersecurity capabilities of organisations working with the U.S. Department of Defense (DoD). It consists of five certification levels, with varying security requirements, and assesses organisations across 17 domains.
One of these domains is incident response, which involves:
- Planning
- Detecting
- Responding to
- Reviewing
- Testing responses to cybersecurity incidents.
The higher the CMMC level achieved, the more mature an organisation’s cybersecurity capabilities.
Level 2
Establish an incident response plan that follows the NIST process. Detect, report, and prioritise events. Respond to events by following predefined procedures. Analyse the cause of incidents in order to mitigate future issues.
Level 3
Document and report incidents to stakeholders that have been identified in the incident response plan. Test the incident response capability of the organisation.
Level 3
Use knowledge of attacker tactics, techniques, and procedures (TTP) to refine incident response planning and execution. Establish a security operation center (SOC) that facilitates a 24/7 response capability.
Level 5
Use accepted and systematic computer forensic data gathering techniques including the secure handling and storage of forensic data. Develop and use manual and automated real-time responses to potential incidents that follow known patterns.
NIST Incident Response Life Cycle
- Preparation
- Detection and Analysis
- Containment, Eradication and Recovery
- Post-Incident Activities
Preparation
The preparation phase in cybersecurity incident response involves creating and training the Computer Security Incident Response Team (CSIRT) and acquiring necessary tools and assets for incident investigation. This phase includes:
- Establishing communication processes within the response team, including contact information for stakeholders, other CSIRTs, and law enforcement.
- Setting up facilities for hosting the response team and the Security Operations Center (SOC).
- Acquiring hardware and software for incident analysis and mitigation, such as forensic tools, servers, backup devices, etc.
- Implementing controls based on risk assessments to reduce incident occurrences.
- Validating the deployment of security hardware and software on user devices, servers, and network equipment.
- Developing user security awareness training materials.
Detection and Analysis
The Detection and Analysis Phase in incident response involves identifying and understanding security incidents. This phase includes:
- Attack Vectors: Understanding common ways incidents can occur, such as through websites, emails, equipment loss, impersonation, attrition, or external media.
- Detection: Finding and recognising security incidents, which can be challenging and involve automated methods like antivirus software or manual reports from users. Incidents can be categorised into “precursors” (indicating potential future incidents) and “indicators” (suggesting current or past incidents).
- Analysis: Evaluating the validity of indicators using complex algorithms and machine learning, especially in large organisations with numerous daily incidents. Profiling network and system activity helps identify unusual changes. The CSIRT must react quickly, following a predefined process and documenting each step.
- Scoping: Determining the scope of an incident, including affected networks, systems, origins, and methods. This information guides subsequent actions like containment and deeper analysis.
- Incident Notification: Notifying relevant stakeholders and external parties, such as the CIO, head of information security, incident response teams, legal, law enforcement, and others, depending on the incident’s nature and potential impact.