Critical Control 18: Incident Response Capabilities
Some time ago I was brought in to help an organization create their Incident Response Team. Working together we defined an incident response procedure, assigned the various roles and responsibilities, worked with executive management to ensure the appropriate supporting policies and controls were in place and 'let her rip'. A few people in the management team had initially commented that they didn't see a need for all of the formality as the organization had never experienced even a minor breach in security. The first few months went by and everything seemed to be working fine. The head of the Incident response team wrote up a summary of all the incidents for the last thirty days and distributed it to all employees at the end of each month. Most of the incidents were pretty innocuous. A virus infection here or there, a targeted web attack that was thwarted by mod_proxy, or other malicious but minor deviations from the norm. Then, on the third month, someone reported a corporate laptop was lost by an employee. I'm told that after that report was distributed to all employees, the email account that was designated for reporting incidents got two separate emails asking if they should be reporting lost or stolen company assets. They were told yes. The following month 5 laptops were reported lost or stolen. The next month 6 laptops were reported lost of stolen. Over the first year of the incident response teams existence 2.5 laptops were reported lost or stolen every month. Prior to having an incident response team the organization had "never had a laptop lost or stolen". So was the creation of an IRT (Incident Response Team) responsible for the theft of all those laptops? Of course not! If you don't measure risk you can't manage it. If you don't have a formal process for capturing and responding to incidents you will not know they are occurring. No matter your size, you should have internal incident response capabilities. As they say, a failure to plan is a plan for failure. Here are some tips for ensuring the success of your organizations incident response capabilities.
-
Write down your incident handling procedures. If it is written down then it is easier to explain to the business why your are doing what you are doing in the heat of battle. If you don't have a written procedure you can use the NIST guideline as a framework. http://csrc.nist.gov/publications/nistpubs/800-61-rev1/SP800-61rev1.pdf
-
Document the roles and responsibilities of people on your incident response team. This will often include representatives from Legal, Human Resources, Public Relations, Compliance your Executive Sponsor and the usual suspect in the networking and information technology engineering groups along with your security team.
-
Management support is critical to the success of most business initiatives. It is especially important when dealing with potentially politically explosive issues that are often associated with security incidents. Maintaining excellent and frequent communications with your executive management is critical to the success of your team.
-
Establish requirements for all personnel to report suspicious incidents to the incident response team.
-
Generate a regular report that summarizes the incidents that have occurred and how you handled them. Distribute the report to all employees in the organization.
-
Require all incident responders to report in within a predefined amount of time once an incident has been declared. Periodically test the team to make sure everyone can be reached in a timely manner. Once you have your team together, conduct training exercises with various scenarios that test the teams ability to access and identify evidence on various systems throughout the networks they are responsible for protecting.
If you would like more information here are some helpful resources:
http://computer-forensics.sans.org/blog/2009/09/12/best-practices-in-digital-evidence-collection/
http://isc.sans.edu/diary.html?storyid=5354
http://www.sans.org/critical-security-controls/
Mark Baggett - Handler on Duty
Twitter @markbaggett
Software Update Potpourri
A couple of updates were released recently that are worth calling to your attention.
- Quicktime - APPLE-SA-2011-10-26-1 QuickTime 7.7.1
This patch addresses critical several issues affecting Quicktime running on Windows.
http://www.apple.com/quicktime/download/
More information is available at the Apple Security Updates
web site: http://support.apple.com/kb/HT
- Chrome 15.0.874.102 to the Stable Channel for Windows, Mac, Linux, and Chrome Frame
This patch addresses a number of issues including XSS, Origin Policy violations, cookie theft and more. Chrome users should look at the details here: http://googlechromereleases.blogspot.com/2011/10/chrome-stable-release.html
- Java 5 Update 30 prelease
A preprelease version of Java 6 update 30 is now available to Java Developers. This is a prerelease and not recommended for production systems. Java developers can check it out here http://jdk6.java.net/6uNea.html
Thanks to Dave and Jim for bringing these to my attention.
Mark Baggett - @markbaggett
Comments
www
Nov 17th 2022
6 months ago
EEW
Nov 17th 2022
6 months ago
qwq
Nov 17th 2022
6 months ago
mashood
Nov 17th 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Nov 23rd 2022
6 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
isc.sans.edu
Dec 3rd 2022
5 months ago
<a hreaf="https://technolytical.com/">the social network</a> is described as follows because they respect your privacy and keep your data secure. The social networks are not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go.
<a hreaf="https://technolytical.com/">the social network</a> is not interested in collecting data about you. They don't care about what you're doing, or what you like. They don't want to know who you talk to, or where you go. The social networks only collect the minimum amount of information required for the service that they provide. Your personal information is kept private, and is never shared with other companies without your permission
isc.sans.edu
Dec 26th 2022
5 months ago
isc.sans.edu
Dec 26th 2022
5 months ago