SlideShare a Scribd company logo
Incident Response
Anshul Gupta
Introduction
• EventVs Incident
• Incident Response and Computer Forensics
• Incident Response Framework
• Incident Response Steps
EventVS Incident
• Event:An event is an observed change to the normal behaviour of a system,
environment, process, workflow or person. Examples: routerACL's were
updated, firewall policy was pushed.
• Incident: An incident is a human-caused, malicious event that leads to (or
may lead to) a significant disruption of business. Examples: attacker posts
company credentials online, attacker steals customer credit card database.
•Note: All incidents are events, but all events are not
incidents.
How Incident Response & Computer Forensics
Fits
Incident Response Framework
Incident Response
• Pre-incident preparation Take actions to prepare the organization and the CSIRT
before an incident occurs.
• Detection of incidents Identify a potential computer security incident.
• Initial response Perform an initial investigation, recording the basic details
surrounding the incident, assembling the incident response team, and notifying the
individuals who need to know about the incident.
• Formulate response strategy Based on the results of all the known facts, determine
the best response and obtain management approval. Determine what civil, criminal,
administrative, or other actions are appropriate to take, based on the conclusions
drawn from the investigation.
Incident Response (Cont...)
• Investigate the incident Perform a thorough collection of data. Review the
data collected to determine what happened, when it happened, who did it,
and how it can be prevented in the future.
• Reporting Accurately report information about the investigation in a manner
useful to decision makers.
• Resolution Employ security measures and procedural changes, record
lessons learned, and develop long-term fixes for any problems identified.
Pre-Incident Preparation
• Preparation leads to successful incident response. During this phase, organization needs to
prepare both the organization itself as a whole and the CSIRT members, prior to responding
to a computer security incident.
• Preparing the CSIRT
The CSIRT is defined during the pre-incident preparation phase. Your organization will assemble a team of
experts to handle any incidents that occur. Preparing the CSIRT includes considering at least the following:
• The hardware needed to investigate computer security incidents
• The software needed to investigate computer security incidents
• The documentation (forms and reports) needed to investigate computer security incidents
• The appropriate policies and operating procedures to implement your response strategies
• The training your staff or employees require to perform incident response in a manner that promotes
successful forensics, investigations, and remediation.
Detection of Incidents
• No matter how you detect an incident, it is paramount to record all of the known
details. An initial response checklist to make sure you record the pertinent facts. The
initial response checklist should account for many details, not all of which will be
readily discernible immediately after an incident is detected. Record the known
facts. Some of the critical details include the following:
• Current time and date
• Who/what reported the incident
• Nature of the incident
• When the incident occurred
• Hardware/software involved
• Points of contact for involved personnel
Detection of Incidents (Cont..)
Initial Response
• One of the first steps of any investigation is to obtain enough information
an appropriate response.
• Assembling the CSIRT
• Collecting network-based and other data
• Determining the type of incident that has occurred
• Assessing the impact of the incident.
• Initial Response will not involve touching the affected system.
Formulate a Response Strategy
• Considering theTotality of Circumstances
• How many resources are need to investigate an incident?
• How critical are the affected systems?
• How sensitive is the compromised or stolen information?
• Who are the potential perpetrators?
• What is the apparent skill of the attacker?
• How much system and user downtime is involved?
• What is the overall loss?
Formulate a Response Strategy (Cont..)
• Considering Appropriate Responses:
Formulate a Response Strategy (Cont..)
• Response Strategy option should be quantified with pros and cons related to the
following:
• Estimated loss
• Network downtime and its operations.
• User downtime and its impact to operations.
• Whether or not your organization is legally compelled to take certain action.
• Public disclosure of the incident and its impact to the organization's reputation/business.
• Taking Action
• Legal Action
• Administrative Action
Investigate the Incident
• The investigation phase involves determining the who, what, when, where,
how, and why surrounding an incident.
• A computer security investigation can be divided into two phases:
• Data Collection
• Forensic Analysis
Investigate the Incident - Phase Steps (Data
Collection)
Investigate the Incident - Phase Steps
(Forensic Analysis)
Reporting
• Reports accurately describe the details of an incident, that are understandable to decision
makers, that can withstand the barrage of legal scrutiny, and that are produced in a timely
manner.
• Some guidelines to ensure that the reporting phase does not become your CSIRT’s nemesis:
• Document immediately All investigative steps and conclusions need to be documented as soon as possible.
Writing something clearly and concisely at the moment you discover evidence saves time, promotes
accuracy, and ensures that the details of the investigation can be communicated more clearly to others at
any moment, which is critical if new personnel become involved or are assigned to lead the investigation.
• Write concisely and clearly Enforce the “write it tight” philosphy. Documenting investigative steps requires
discipline and organization. Write everything down in a fashion that is understandable to you and others.
Discourage shorthand or shortcuts. Vague notations, incomplete scribbling, and other unclear
documentation can lead to redundant efforts, forced translation of notes, confirmation of notes, and a
failure to comprehend notes made by yourself or others.
• Use a standard format Develop a format for your reports and stick to it. Create forms, outlines, and
templates that organize the response process and foster the recording of all pertinent data.This makes
report writing scalable, saves time, and promotes accuracy.
Resolution
• The goal of the resolution phase is to implement host-based, network-based, and
procedural countermeasures to prevent an incident from causing further damage and to
return your organization to a secure, healthy operational status. In other words, in this
phase, you contain the problem, solve the problem, and take steps to prevent the problem
from occurring again.
• The following steps are often taken to resolve a computer security incident:
• Identify organization’s top priorities. Which of the following is the most critical to resolve: returning all
systems to operational status, ensuring data integrity, containing the impact of the incident,
collecting evidence, or avoiding public disclosure?
• Determine the nature of the incident in enough detail to understand how the security occurred and
what host-based and network-based remedies are required to address it.
• Determine if there are underlying or systemic causes for the incident that need to be addressed (lack
of standards, noncompliance with standards, and so on).
Resolution (Cont...)
• Restore any affected or compromised systems. You may need to rely on a prior version of
the data, server platform software, or application software as needed to ensure that the
system performs as you expect it to perform.
• Apply corrections required to address any host-based vulnerabilities. Note that all fixes
should be tested in a lab environment before being applied to production systems.
• Apply network-based countermeasures such as access control lists, firewalls, or IDS.
• Assign responsibility for correcting any systemic issues.
• Track progress on all corrections that are required, especially if they will take significant
time to complete.
• Validate that all remedial steps or countermeasures are effective. In other words, verify that
all the host-based, network-based, and systemic remedies have been applied correctly.
• Update your security policy and procedures as needed to improve your response process.
Conclusion

More Related Content

Incident response

  • 2. Introduction • EventVs Incident • Incident Response and Computer Forensics • Incident Response Framework • Incident Response Steps
  • 3. EventVS Incident • Event:An event is an observed change to the normal behaviour of a system, environment, process, workflow or person. Examples: routerACL's were updated, firewall policy was pushed. • Incident: An incident is a human-caused, malicious event that leads to (or may lead to) a significant disruption of business. Examples: attacker posts company credentials online, attacker steals customer credit card database. •Note: All incidents are events, but all events are not incidents.
  • 4. How Incident Response & Computer Forensics Fits
  • 6. Incident Response • Pre-incident preparation Take actions to prepare the organization and the CSIRT before an incident occurs. • Detection of incidents Identify a potential computer security incident. • Initial response Perform an initial investigation, recording the basic details surrounding the incident, assembling the incident response team, and notifying the individuals who need to know about the incident. • Formulate response strategy Based on the results of all the known facts, determine the best response and obtain management approval. Determine what civil, criminal, administrative, or other actions are appropriate to take, based on the conclusions drawn from the investigation.
  • 7. Incident Response (Cont...) • Investigate the incident Perform a thorough collection of data. Review the data collected to determine what happened, when it happened, who did it, and how it can be prevented in the future. • Reporting Accurately report information about the investigation in a manner useful to decision makers. • Resolution Employ security measures and procedural changes, record lessons learned, and develop long-term fixes for any problems identified.
  • 8. Pre-Incident Preparation • Preparation leads to successful incident response. During this phase, organization needs to prepare both the organization itself as a whole and the CSIRT members, prior to responding to a computer security incident. • Preparing the CSIRT The CSIRT is defined during the pre-incident preparation phase. Your organization will assemble a team of experts to handle any incidents that occur. Preparing the CSIRT includes considering at least the following: • The hardware needed to investigate computer security incidents • The software needed to investigate computer security incidents • The documentation (forms and reports) needed to investigate computer security incidents • The appropriate policies and operating procedures to implement your response strategies • The training your staff or employees require to perform incident response in a manner that promotes successful forensics, investigations, and remediation.
  • 9. Detection of Incidents • No matter how you detect an incident, it is paramount to record all of the known details. An initial response checklist to make sure you record the pertinent facts. The initial response checklist should account for many details, not all of which will be readily discernible immediately after an incident is detected. Record the known facts. Some of the critical details include the following: • Current time and date • Who/what reported the incident • Nature of the incident • When the incident occurred • Hardware/software involved • Points of contact for involved personnel
  • 11. Initial Response • One of the first steps of any investigation is to obtain enough information an appropriate response. • Assembling the CSIRT • Collecting network-based and other data • Determining the type of incident that has occurred • Assessing the impact of the incident. • Initial Response will not involve touching the affected system.
  • 12. Formulate a Response Strategy • Considering theTotality of Circumstances • How many resources are need to investigate an incident? • How critical are the affected systems? • How sensitive is the compromised or stolen information? • Who are the potential perpetrators? • What is the apparent skill of the attacker? • How much system and user downtime is involved? • What is the overall loss?
  • 13. Formulate a Response Strategy (Cont..) • Considering Appropriate Responses:
  • 14. Formulate a Response Strategy (Cont..) • Response Strategy option should be quantified with pros and cons related to the following: • Estimated loss • Network downtime and its operations. • User downtime and its impact to operations. • Whether or not your organization is legally compelled to take certain action. • Public disclosure of the incident and its impact to the organization's reputation/business. • Taking Action • Legal Action • Administrative Action
  • 15. Investigate the Incident • The investigation phase involves determining the who, what, when, where, how, and why surrounding an incident. • A computer security investigation can be divided into two phases: • Data Collection • Forensic Analysis
  • 16. Investigate the Incident - Phase Steps (Data Collection)
  • 17. Investigate the Incident - Phase Steps (Forensic Analysis)
  • 18. Reporting • Reports accurately describe the details of an incident, that are understandable to decision makers, that can withstand the barrage of legal scrutiny, and that are produced in a timely manner. • Some guidelines to ensure that the reporting phase does not become your CSIRT’s nemesis: • Document immediately All investigative steps and conclusions need to be documented as soon as possible. Writing something clearly and concisely at the moment you discover evidence saves time, promotes accuracy, and ensures that the details of the investigation can be communicated more clearly to others at any moment, which is critical if new personnel become involved or are assigned to lead the investigation. • Write concisely and clearly Enforce the “write it tight” philosphy. Documenting investigative steps requires discipline and organization. Write everything down in a fashion that is understandable to you and others. Discourage shorthand or shortcuts. Vague notations, incomplete scribbling, and other unclear documentation can lead to redundant efforts, forced translation of notes, confirmation of notes, and a failure to comprehend notes made by yourself or others. • Use a standard format Develop a format for your reports and stick to it. Create forms, outlines, and templates that organize the response process and foster the recording of all pertinent data.This makes report writing scalable, saves time, and promotes accuracy.
  • 19. Resolution • The goal of the resolution phase is to implement host-based, network-based, and procedural countermeasures to prevent an incident from causing further damage and to return your organization to a secure, healthy operational status. In other words, in this phase, you contain the problem, solve the problem, and take steps to prevent the problem from occurring again. • The following steps are often taken to resolve a computer security incident: • Identify organization’s top priorities. Which of the following is the most critical to resolve: returning all systems to operational status, ensuring data integrity, containing the impact of the incident, collecting evidence, or avoiding public disclosure? • Determine the nature of the incident in enough detail to understand how the security occurred and what host-based and network-based remedies are required to address it. • Determine if there are underlying or systemic causes for the incident that need to be addressed (lack of standards, noncompliance with standards, and so on).
  • 20. Resolution (Cont...) • Restore any affected or compromised systems. You may need to rely on a prior version of the data, server platform software, or application software as needed to ensure that the system performs as you expect it to perform. • Apply corrections required to address any host-based vulnerabilities. Note that all fixes should be tested in a lab environment before being applied to production systems. • Apply network-based countermeasures such as access control lists, firewalls, or IDS. • Assign responsibility for correcting any systemic issues. • Track progress on all corrections that are required, especially if they will take significant time to complete. • Validate that all remedial steps or countermeasures are effective. In other words, verify that all the host-based, network-based, and systemic remedies have been applied correctly. • Update your security policy and procedures as needed to improve your response process.