Incident Response Steps and Frameworks for SANS and NIST
文章推薦指數: 80 %
SANS stands for SysAdmin, Audit, Network, and Security. They're a private organization that, per their self description, is “a cooperative ... Categories: All blogs Securityessentials AT&TAlien Labsresearch Categories All blogs Securityessentials AT&T AlienLabsresearch AT&TCybersecurity Blog IncidentResponseStepsandFrameworksforSANSandNIST January3,2020 | ElishaGirken WhatisIncidentResponse? Incidentresponseisaplanforrespondingtoacybersecurityincidentmethodically.Ifanincidentisnefarious,stepsaretakentoquicklycontain,minimize,andlearnfromthedamage. Noteverycybersecurityeventisseriousenoughtowarrantinvestigation.Events,likeasingleloginfailurefromanemployeeonpremises,aregoodtobeawareofwhenoccurringasisolatedincidents,butdon’trequiremanhourstoinvestigate.Yourcybersecurityteamshouldhavealistofeventtypeswithdesignatedboundariesonwheneachtypeneedstobeinvestigated.Fromthere,youshouldhavecustomizedincidentresponsestepsforeachtypeofincident. TheImportanceofIncidentResponseSteps Adatabreachshouldbeviewedasa“when”not“if”occurrence,sobepreparedforit.Underthepressureofacriticallevelincidentisnotimetobefiguringoutyourgameplan.Yourfutureselfwillthankyouforthetimeandeffortyouinvestonthefrontend. Incidentresponsecanbestressful,andISstressfulwhenacriticalassetisinvolvedandyourealizethere’sanactualthreat.Incidentresponsestepshelpinthesestressing,highpressuresituationstomorequicklyguideyoutosuccessfulcontainmentandrecovery.Responsetimeiscriticaltominimizingdamages.Witheverysecondcounting,havingaplantofollowalreadyinplaceisthekeytosuccess. TheTwoIndustryStandardIncidentResponseFrameworks Introducedinnoparticularorder,NISTandSANSarethedominantinstituteswhoseincidentresponsestepshavebecomeindustrystandard. NIST NISTstandsforNationalInstituteofStandardsandTechnology.They’reagovernmentagencyproudlyproclaimingthemselvesas“oneofthenation’soldestphysicalsciencelaboratories”.Theyworkinall-things-technology,includingcybersecurity,wherethey’vebecomeoneofthetwoindustrystandardgo-tosforincidentresponsewiththeirincidentresponsesteps. TheNISTIncidentResponseProcesscontainsfoursteps: Preparation DetectionandAnalysis Containment,Eradication,andRecovery Post-IncidentActivity IncidentResponseService Helpsyoudevelopaplantoquicklyrespondtoattacksandmitigatetheimpactofincidents. Learnmore SANS SANSstandsforSysAdmin,Audit,Network,andSecurity.They’reaprivateorganizationthat,pertheirselfdescription,is“acooperativeresearchandeducationorganization”.ThoughmoreyouthfulthanNIST,theirsolefocusissecurity,andthey’vebecomeanindustrystandardframeworkforincidentresponse. TheSANSIncidentResponseProcessconsistsofsixsteps: Preparation Identification Containment Eradication Recovery LessonsLearned TheDifferenceBetweenNISTandSANSIncidentResponseSteps Withtwoindustrystandardframeworks,there’sachanceyou’refamiliarwithonebutnottheother.Solet’sdoawalk-throughoftheirsimilaritiesanddifferences.First,here’saside-by-sideviewofthetwoprocessesbeforewediveintowhateachstepentails. Placedside-by-sideinalistformat,youcanseeNISTandSANShaveallthesamecomponentsandthesameflowbutdifferentverbiageandclustering.Let’swalkthroughwhateachofthestepsentailtogetintothenuanceddifferencesoftheframeworks. Forconsistency,NISTstepswillalwaysbepresentedontheleftandSANSontherightduringthestepsside-by-sidecomparisons. Step1)Preparation=Step1)Preparation Preparationiskeytorapidresponse.Webeatthisdrumearlierwhendiscussingtheimportanceofhavingincidentresponsesteps. ThisstepissimilarforbothNISTandSANS.Inthisstepyoucompilealistofallyourassets,includingbutnotlimitedto:servers,networks,applications,andcriticalendpoints(likeC-levellaptops).Afteryou’vecompiledyourassetlist,rankthembylevelofimportance.Thenmonitortheirtrafficpatternssoyoucancreatebaselinestobeusedforcomparisonslater. Createacommunicationplan,withguidanceonwhotocontact,how,andwhenbasedoneachincidenttype.Don’tforgettogetbuy-infromeveryoneonthiscontactlisttopreventhiccupsorfingerpointinglater. Determinewhichsecurityevents,andatwhatthresholds,theseeventsshouldbeinvestigated. Thencreateanincidentresponseplanforeachtypeofincident.Itcanbeimprovedthroughsecurityeventsimulations,whereyouidentifyholesinyourprocess,butitwillalsobeimprovedafteractualevents(moreonthatlater).Thepointis,getaprocessinplace. Step2)DetectionandAnalysis=Step2)Identification Again,thisstepissimilarforbothNISTandSANS,butwithdifferentverbiage. Atthispointintheprocess,asecurityincidenthasbeenidentified.Thisiswhereyougointoresearchmode.Gathereverythingyoucanonthetheincident.Thenanalyzeit.Determinetheentrypointandthebreadthofthebreach.Thisprocessismadesubstantiallyeasierandfasterifyou’vegotallyoursecuritytoolsfilteringintoasinglelocation. Step3)Containment,Eradication,&Recovery=Steps3-5)Containment.Eradication.Recovery. HereiswhereNISTandSANSkind-ofpartwaysintheir similaritiesbeforeagreeingagainonthefinalstep.NISTviewstheprocessofcontainment,eradication,andrecoveryasasingularstepwithmultiplecomponents.SANSviewsthemastheirownindependentsteps. Containmentaimstostopthebleeding.Hereiswhereyoupatchthethreat’sentrypoint. Eradicationaimstoremovethethreat.Ifthethreatgainedentryfromonesystemandproliferatedintoothersystems,you’llhavemoreworkonyourhandshere. Recoveryaimstogetthesystemoperationalifitwentdownorsimplybacktobusinessasusualifitdidn’t. Step4)Post-IncidentActivity=Step6)LessonsLearned NISTandSANSareinagreementagainintheirlaststep,ifnotinverbiage,inspirit. Thisstepprovidestheopportunitytolearnfromyourexperiencesoyoucanbetterrespondtofuturesecurityevents.Temptingasitmaybetoskip,withyourneverendingto-dolist,thisstepisstronglyrecommended. Takealookattheincidentwithahumblebutcriticaleyetoidentifyareasforimprovement.Thengoaddthoseimprovementstoyourdocumentation. Noprocessisperfectforabsolutelyeverypossiblescenario.Somescenarioscan’tevenbefathomeduntilthey’veoccurred.Thethreatlandscapeisalsoever-evolvingsoyourincidentresponseprocesswillnaturallyneedtheoccasionalupdate.Remember,yourfutureselfwillthankyou. TheIncidentResponseStepsPoll InaninformalTwitterpollonapersonalaccount,oneofusgotcuriousandaskedpeoplewheretheirincidentresponseguidancecomesfrom.Checkouttheresult: Whilenotastatisticallysignificantpoll,69%ofrespondentsuseNISTorSANS.Notsurprisingsincethey’reindustrystandards,butitscratchedourcuriosityitch. WhichIncidentResponseStepsFrameworkisBetter? Ah,tobedefinitelytoldananswer.Nosuchchancehere.Itreallydoescomedowntopersonalpreference.Doesitmakemoresensetoyoutobreakcontainment,eradication,andrecoveryintotheirownstepsorkeepthemgroupedinasinglestep?Letyouranswertothatquestionguideyoutotherightchoice. Botharepopularandhavesupporters.Regardlessofwhichyouchoose,bothNISTandSANShaveincidenthandlingchecklistsavailabletogetyoustarted.Justremembertocustomizethemtoyourspecificneedsandcompany’senvironment...andbeforeyou’reinthemidstofanincidentresponse. Ifyou'dliketofurtherexploreincidentresponse,checkoutourfreeInsider'sGuide. Sharethiswithothers Tags:incidentresponse,incidentresponseandmanagement,sans,nist,ir Featuredresources INDUSTRYREPORT AT&TCybersecurityInsights™Report: 5GandtheJourneytotheEdge Learnmore SELFASSESSMENT Benchmarkyourcybersecuritymaturity Explore Getprice Freetrial Weusecookiestoprovideyouwithagreatuserexperience.Byusingourwebsite,youagreetoourPrivacyPolicyandWebsiteTermsofUse.
延伸文章資訊
- 1Incident Response Steps for SANS and NIST - CrowdStrike
Incident Response Frameworks · Step #1: Preparation · Step #2. Detection & Analysis · Step #3. Co...
- 2Threat Hunting & Digital Forensics Course | SANS FOR508
This in-depth incident response and threat hunting course provides responders and threat hunting ...
- 3Incident Response SANS: The 6 Steps in Depth - Cynet
Incident response helps organizations ensure that organizations know of security incidents and th...
- 4Incident Response Steps and Frameworks for SANS and NIST
SANS stands for SysAdmin, Audit, Network, and Security. They're a private organization that, per ...
- 5Graduate Certificate Programs: Incident Response - SANS ...
Designed for working information security and IT professionals, the graduate certificate in Incid...