Incident Response Phases |
- Preparation - Detection & Analysis - Containment - Eradication & Recovery - Post Incident Activity |
Communication plan |
- Limiting communication to trusted parties - Disclosing based on regulatory/legislative requirements - Preventing inadvertent release of information - Using a secure method of communication - Reporting requirements |
Reporting Requirements - Type of Breach |
- Data exfiltration - Insider data exfiltration - Device theft/loss - Accidental data breach - Integrity/availability |
Response coordination |
- Legal - Human resources - Public relations - Internal and external - Law enforcement - Senior leadership - Regulatory bodies |
Data Criticality and Prioritization |
- Personally Identifiable Information (PII) - Sensitive Personal Information (SPI) - Personal Health Information (PHI) - Financial Information - Intellectual property (IP) - Corporate Information - high value asset (HVA) |
Preparation Phase |
- Training - Testing - Documentation of procedures |
Documentation of Procedures |
- Incident Response Plan - Call List/Escalation List - Incident Form |
OODA loop |
- Observe - Orient - Decide - Act |
Defensive Capabilities |
- Detect - Destroy - Degrade - Disrupt - Deny - Deceive |
Immediate impact |
direct costs incurred because of an incident |
Total impact |
costs that arise following the incident, including damage to the company's reputation |
Incident Security Level Classification characteristics (Detection & Analytics) |
- Data integrity - System process criticality - Downtime - Economic - Data correlation - Reverse engineering - Recovery time - Detection time |
Containment |
- Isolation-Based Containment - Segmentation-based Containment |
Containment principals |
- Ensure the safety and security of all personnel. - Prevent ongoing intrusion or data breach. - Identify whether the intrusion is the primary attack or a secondary one (part of a more complex campaign). - Avoid alerting the attacker to the fact that the intrusion has been discovered. - Preserve forensic evidence of the intrusion. |
Eradication |
- Sanitization and Secure Disposal (cryptographic erase, zero-fill) - Reconstruction/Reimaging - Reconstitution of Resources |
cryptographic erase |
A method of sanitizing a self-encrypting drive by erasing the media encryption key |
zero-fill |
A method of sanitizing a drive by setting all bits to zero. |
Secure disposal |
physical destruction by mechanical shredding or incineration |
Reimage |
A method of restoring a system that has been sanitized using an image-based backup. |
Reconstruction |
A method of restoring a system that has been sanitized using scripted installation routines and templates. |
Reconstitution |
A method of restoring a system that cannot be sanitized using manual removal, reinstallation, and monitoring processes. |
Recovery |
- Patching - Restoration of Permissions - Verification of Logging/Communication to Security Monitoring - Vulnerability Mitigation and System Hardening |
Post-Incident Activities |
- Report Writing - Incident Summary Report - Evidence Retention |