Understanding Incident Response Frameworks - NIST & SANS
文章推薦指數: 80 %
The term Incident Response refers to the processes and policies an organization utilises in response to a cyber incident such as an attack or data breach. June21,2021 UnderstandingIncidentResponseFrameworks-NIST&SANS PrasannaKumar NISTFramework, Governance,Risk&Compliance, Monitoring,Detection&Response ThetermIncidentResponsereferstotheprocessesandpoliciesanorganizationutilisesinresponsetoacyberincidentsuchasanattackordatabreach.ThegoalofIncidentResponseistomitigatethedamageofanattacki.e.reducetherecoverytime,effort,costsandreputationaldamageassociatedwithacyberattackordatabreach.Apartfrommitigatingvariousconsequencesofacyberattack,theprocessofIncidentResponsecanhelporganizationspreventfutureattacksthatthreatentheirinformationsecurity. EveryorganizationshouldhaveanIncidentResponseorIRplanthathelpsthemidentify,containandeliminatecyberattacks.IRplansoutlinewhatconstitutesanattackandprovideorganisationswithaclearguideonwhatstepsshouldbetakenifanincidentweretooccur. IncidentResponseFrameworks ThepurposeofanIncidentresponseframeworkistoassistorganizationswiththecreationofstandardizedresponseplans.Theseframeworksarecommonlydevelopedbylargeorganizationswithasignificantamountofsecurityexpertiseandexperience.Twoofthemostwell-knownexamplesaretheIncidentResponseFrameworkscreatedbytheNationalInstituteofStandardsandTechnology(NIST)andtheSysAdmin,Audit,NetworkandSecurityInstitute(SANS).BelowisanoutlineofeachoftheseIncidentResponseFrameworks: NISTIncidentResponseFramework TheNationalInstituteofStandardsandTechnology(NIST)wasfoundedin1901andisnowpartoftheU.S.DepartmentofCommerce.NISTisoneofthenation'soldestphysicalsciencelaboratories.AspartoftheircybersecurityinitiativestheycreatedanIncidentResponseFramework,whichquicklybecameoneofthemostpopularsolutionsfororganizationsaroundtheworld.Theframeworkprovidesorganizationswithdetailedstepsonhowtocreateanincidentresponseplan,formanincidentresponseteam,communicationproceduresaswellastrainingscenariosforemployees. TheIncidentResponseCycle NISTdefinesafour-stepprocessforincidentresponse,theprocessputsemphasisonthefactthatincidentresponseisnotalinearprocessthatstartswhenanincidentisdetectedandendswitheradicationandrecovery.Instead,incidentresponseisacyclicalactivity,aprocessofcontinuouslearningandimprovementtodiscoverhowtobetterdefendtheorganizationagainstcyberattacks. ThefourstepsofNISTIncidentResponse: #1Preparation ThisinvolvesorganizationsdoingathoroughinventoryoftheirITinfrastructureincluding,networks,serversandendpoints,andevaluatingtheirimportance.ToevaluateimportanceorganizationsneedtojudgewhichITassetsholdcriticalorsensitiveinformation.Alongwiththis,organizationsneedtocreateabaselinefornormalactivitythroughmonitoring.Aspartofpreparation,securityteamsalsoneedtocreateaguideforhowtodealwithcommontypesofincidentsandidentifywhichtypesofincidentsrequirethoroughinvestigation. #2DetectionandAnalysis DetectioninvolvescollectingdatafromITsystems,securitytools,publiclyavailableinformationandpeopleinsideandoutsidetheorganization,andidentifyingsignsthatanincidentmayhappeninthefuture(precursors)anddatashowingthatanattackhashappenedorishappeningnow(Indicators). Analysisinvolvesidentifyingabaselineornormalactivityfortheaffectedsystems,correlatingrelatedeventsandseeingifandhowtheydeviatefromnormalbehavior. #3Containment,Eradication,andRecovery Thegoalofcontainmentistolimittheimpactofasecurityincident,withoutpropercontainmentincidentscanspreadacrossanorganisation'ssystemsandnetworks,givingunlimitedaccesstomaliciousactors.Anorganization’scontainmentstrategycandependonthelevelofdamageanincidentcancause,theabilitytocontinueservicingcustomers,theabilityofemployeestocontinueoperatingandthedurationofthesolution.Dependingonthesefactorsorganizationsmaydecidetoutiliseatemporarysolutionversusapermanentone. Aftertheincidenthasbeensuccessfullycontained,organizationsarerequiredtoeradicatetheincident,thiscanbeachievedbyremovingallelementsoftheincidentfromtheenvironment.Forexample,identifyingallaffectedhosts,removingmalware,andclosingorresettingpasswordsforbreacheduseraccountsareexamplesoferadication. Finally,oncethethreatiseradicated,restoresystemsandrecovernormaloperationsasquicklyaspossible,takingstepstoensurethesameassetsarenotattackedagain. #4Post-IncidentActivity AkeypartoftheNISTIncidentResponsemethodologyislearningfromincidentstoimprovetheoverallresponseprocess.Securityteamsneedtoaskquestionssurroundingtheincidentresponseprocesssuchas:Whathappened?Howwelldidwedealwiththeincident?Wereprocessesfollowedanddidtheysuffice?Whatwentwrongintheresponseprocess?Whatcanwedodifferentlynexttime?Etc.Theseareafewexamplesofquestionsthatcanbeaskedduringpost-incidentactivity,answerscanbeusedtoimprovetheprocess,adjustanorganization’sincidentresponsepolicy,plan,andproceduresaswellasfine-tuneresearchundertakeninthepreparationstageofthecycle. SANSIncidentResponseFramework TheSANSInstituteisaprivateU.S.for-profitcompanyfoundedin1989thatspecializesininformationsecurity,cybersecuritytraining,andsellingcertificates.OneofthemaincontributionstheSANSInstitutehasmadetocybersecurityistheirIncidentResponseFramework,whichhasalsogarneredpraisefromorganizationsaroundtheworldforitscomprehensiveness.TheSANSInstitutepublisheda20-pagehandbookthatlaysoutastructured6-stepplanforincidentresponse.Belowisabriefsummaryoftheprocess. TheSANSIncidentResponseProcessconsistsoffivesteps: #1Preparation Thisinvolvesorganizationsperformingreviewsovertheirsecuritypolicy,whichtypicallyinvolvesriskassessmentstoidentifyvulnerabilities,sensitiveassetsandareasoffocusintermsofsecurityincidents.InthisstageorganizationsalsoworktowardsformingaComputerSecurityIncidentResponseTeamorCSIRTinshort. #2Identification Inthisstage,securityteamsmonitorsystemsandnetworkstoidentifyanysuspiciousactivitytakingplaceduringdaytodayoperations,inthehopesofdiscoveringanyprematuresecurityincidents.Ifanincidentistobediscovered,securityteamsshoulddocumenteverything,e.g.thenatureoftheattackorit’sorigin. #3Containment IfanIncidentisidentifiedthenextstepthatfollowsiscontainment,securityteamsneedtoworktowardsisolatingtheattackandpreventingitfromspreading.Thiscaninvolvesegmentinganetworkunderattackaspartofshorttermcontainment.Onceshorttermmeasuresareinplace,securityteamscanfocusonlongtermsolutionsorfixeswhichmayinvolverebuildingentiresystems. #4Recovery Thisstepinvolvesbringingbackaffectedsystemsthatweretakendownovertheperiodoftheincident.Securityteamsshouldtestandmonitoraffectedsystemstoensurethatattacksdon’trepeatandthatnormalfunctionalityisachieved. #5LessonsLearned Shortlyaftertheattack,teamsneedtolookbackandevaluatehowtheincidentwashandledandanalysehowtheincidentresponseprocesscanbeimprovedforfutureincidents. NowthatyouknowaboutIRframeworks,youcantakealookatsomeofincidentresponsebestpracticesthatorganisationsshouldfollow. Doesyourcompanycurrentlyhaveanincidentresponseplaninplace?StickmanCyber'sexpertteamcanhelpreviewyourcurrentcybersecuritysetupandsetuptherightincidentresponseplanto secureyourbusiness. Similarposts ISO27001, NISTFramework, Governance,Risk&Compliance NISTFrameworkvs.ISO27001-HowtoChoose TheNationalInstituteofStandardsandTechnology(NIST)andtheInternational... PrasannaKumar March24,2021 NISTFramework, Governance,Risk&Compliance 6BenefitsofImplementingNISTFrameworkinYourOrganization TheNISTFrameworkisthegoldstandardonhowtobuildyourcybersecurityprogram.Now... PrasannaKumar March16,2021 Getnotifiedfornewcybersecurityinsights Subscribeforaweeklyround-upofthelatestincybersecurity-fromknowingthepotentialthreats,tobestpractices,toinsightsonhowtomanage,evolveandstrengthenyourcybersecurityposture-we'llshareitall.
延伸文章資訊
- 1Incident Response SANS: The 6 Steps in Depth - Cynet
Incident response helps organizations ensure that organizations know of security incidents and th...
- 26 Steps of Incident Response Plan SANS - Cybersecurity ...
6 Steps of Incident Response Plan SANS · 1. Preparation · 2. Identification · 3. Containment · 4....
- 3SANS Digital Forensics and Incident Response - YouTube
- 4Graduate Certificate Programs: Incident Response - SANS ...
Designed for working information security and IT professionals, the graduate certificate in Incid...
- 5Incident Handler's Handbook - SANS Institute
An incident is described as any violation of policy, law, or unacceptable act that involves infor...