How Can We Help?

Section 24 – Incident Response

You are here:
< All Topics

Section 24 Incident Response

incident: act of violating a security policy

eg password cracking or installing malware – breaks security policy

NIST standard is commonly used: US Nat Inst of Standards and Technology

 

IR procedures for handling Incidents

many procedures

 

7 phase model is used:

preparation – strengthening systems to resist attacks

training, testing, trial exercises

detection

id’s security incidents

analysis

examination of the incident

informing stakeholders

containment

securing data and protecting biz operations

prevent malware spreading further eg disconnecting server/wkstn from network

eradication

once contained we can begin eradication

 

recovery

restoring systems to known good state – eg via backup, security backups, config updates

 

lessons learned

after all the above

how can we improve for the future

what do we need to change re our procedures

 

root cause analyss

uses a 4 stage process:

1. define cause

eg a user plugging in a usb stick

ie determine causal relationship which led to the incident

 

2. id effective solution

 

3. implement and track solution

 

4. lessons learned/ after action report

 

large orgs often have ft incident response teams, small ones form temporary teams or may be a function of the sys admin role

 

THREAT HUNTING

finding hidden threats not caught by our regular security monitoring – instead of waiting for them to appear by themselves – a more proactive approach

who might want to harm us

what might they try to do,

and how might they try to do it

that TTPs might they use

what kind of threat actor are they eg criminal, hackivist, competitor, hostile nation state, etc

analyse logs and process/file data

how does TH differ from usual security monitoring – we start with idea that our usual procedures have failed.

looks for NEW threats – undetected issue, thinks that have somehow bypassed the checks

Indicators of Comprimise IoCs

We refer to threat intel sources, eg advisories and bulletins, from vendors and security researchers

Intel Fusion and Threat Data, use SIEM platform data

eg outbound traffic – where is it going?

what progs are running on our servers?

what connections are there

 

threat hunting is costly, a lot of overhead, but can be worthwhile to improve security

integrate the TH with threat intelligence

 

 

ROOT CAUSE ANALYSIS

is a 4 stage process:

1. define scope of the incident

2. what was the initial source of the incident

3.. determine the causal relationship

which led to the incident

eg someone clicking a link in an email

4. id a solution

tell users not to click on links, antivirus scanning, email scanning

 

very important: a no-blame culture!

A NO BLAME approach can help a lot – helps with investigation and transparancy and honesty, to get the true facts.

primary purpose of root cause analysis is not to assign blame but to figure out what caused the incident, nothing more.

 

TRAINING and TESTING

differ!

training: ensure staff understand incident response tasks and procedures

 

 

 

 

 

 

Tags:
Table of Contents