42
Michael McDonnell GIAC Certified Intrusion Analyst [email protected] Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike. Incident Response

Incident Response

Embed Size (px)

DESCRIPTION

A presentation on developing an Incident Response Program (Information Security related). Heavily based on NIST guidelines.

Citation preview

Page 1: Incident Response

Michael McDonnellGIAC Certified Intrusion Analyst

[email protected]

Creative Commons License: You are free to share and remix but you must provide attribution and you must share alike.

IncidentResponse

Page 2: Incident Response

Incident Response Overview

1. Events and Incidents2. Response vs Handling3. Process and Capability4. Questions

Page 3: Incident Response

Incidents are Events

Any real or suspected adverse event

related to information systems

A violation existing Information security policy

Page 4: Incident Response

Security Incidents are Common

Any real or suspected adverse event

related to information systems

A violation existing Information security policy

Page 5: Incident Response

Incidents are… Viruses

Page 6: Incident Response

Incidents are… Hackers

Page 7: Incident Response

Incidents are… Hackers

Page 8: Incident Response

Incidents are… Vandalism

Page 9: Incident Response

Incidents are… Theft

Page 10: Incident Response

Incidents are… Data Loss

Page 11: Incident Response

Incidents are… “Outages”

Page 12: Incident Response

Incidents are… Espionage

Page 13: Incident Response

Incidents are not… Disasters (maybe)

Page 14: Incident Response

Incidents are… Continuous

Page 15: Incident Response

Incident Response is a Capability

1.Events: Monitor and Detect

2.Incidents: Identify and Analyze

3.Actions: Contain and Correct

4.Lessons: Learn and Improve

Page 16: Incident Response

Incidents Response is…

A Processthat manages risk associated with information systems

A Capabilityof an organization to respond to continuous security threats

Page 17: Incident Response

Incidents Response vs Handling

Strategic vs OperationalContinual vs Discreet

Process vs ActionImprovement vs Remediation

Page 18: Incident Response

Incidents Response is…

SystematicConsistent

Fast & EfficientDriver for Improvement

Authoritative/EmpoweredSensitive/Confidential

Documented

Page 19: Incident Response

Incidents Response Teams

Supported by ManagementCross-functional

Well TrainedGood Communicators

Technical ExpertsWell Equipped

Have Broad Access

Page 20: Incident Response

Incident Response is a Process

1.Preparation2.Detection and Analysis3.Containment/Mitigation4.Recovery5.Post-Incident Analysis

1.Be Prepared2.Be Systematic & Organized3.Act Quickly4.Fix the Problem5.Make Improvements

Page 21: Incident Response

Preparation: Training

Page 22: Incident Response

Preparation: Communications

Page 23: Incident Response

Preparation: Hardware & Software

Page 24: Incident Response

Preparation: Continuous Monitoring

Page 25: Incident Response

Preparation: Analysis & Migitation

Page 26: Incident Response

Detection & Analysis

Different threat require different responses

Incident Categories:1. Denial of Service2. Malicious Software3. Unauthorized Access4. Inappropriate Usage5. Hybrid

Detection: How was it detected? Is it really an incident or an unusual event? Can it be confirmed?

Analysis: What is at risk? (“System Profile”) What is normal for that system? Correlate events for more information Carefully record and document data

Page 27: Incident Response

Detection & Analysis

Page 28: Incident Response

Detection & Analysis

Page 29: Incident Response

Diagnosis Matrix

Extremely helpful for inexperienced or ad-hoc incident handlers.

Part of diagnosis means seeking help from others• Sysadmins for knowledge of normal system operations• Managers for knowledge of impact

Page 30: Incident Response

Incident Documentation

Begin as soon as an incident is suspected

Include: System events Telephone conversations Observed or initiated changes Note the current status frequently with timestamps.

At any given moment: Current status and priority Summary of incident Actions taken by handlers Contact information for other parties List of evidence gathered Comments for other handlers Next steps to be taken

Page 31: Incident Response

Incident Priority: Effect & Criticality

Page 32: Incident Response

Incident Containment & Mitigation

Identify and block the attackerPatch the systemTake the system offlineUpgrade softwareRestore from backupReboot

It is key to consult external databases for advice, and data about the type of attack, the attacker, the problem, and its solution.

Page 33: Incident Response

Incident Containment & Mitigation

Page 34: Incident Response

Incident Post-Mortem

Incident Response is a driver for improvements in information security. So it is critical to conduct a post-incident analysis and report.

Exactly what happened, and at what times? How well did staff and management perform in dealing with the incident? Were

the documented procedures followed? Were they adequate? What information was needed sooner? Were any steps or actions taken that might have inhibited the recovery? What would the staff and management do differently the next time a similar

incident occurs? What corrective actions can prevent similar incidents in the future? What additional tools or resources are needed to detect, analyze, and mitigate

future incidents?What Personally Identifiable Information involved? Is disclosure advised?

Page 35: Incident Response

Incident Post-Mortem

Page 36: Incident Response

Incident Checklist

Page 37: Incident Response

Incident Reporting

What should you report?

What happened?Why did it happen?What was done to correct it?What impact did it have?What did it cost?What could have been done differently?How could it have been avoided?Is it resolved? What else is needed?How likely is it to happen again? How often?What is the long term impact?

Page 38: Incident Response

Information Security is an Outcome

"Our systems are secure from hackers“

"We have blocked 17,342 viruses to date“

“Our systems are all online“

“Insiders cannot steal our information”

“We have backups”

“We are Secure”

Page 39: Incident Response

Information Security is a Process

“We want to improve security“

"We need to protect against more threats"

"We want to reduce risk"

"We want to increase customer confidence"

"We want to decrease the number of compromises"

“We want to be more Secure”

Page 40: Incident Response

Defence in Depth lowers Risk

Page 41: Incident Response

Process leads to Outcome

Firewalls do not make you secureAnti-virus does not make you secure

Policies do not make you secureVPNs do not make you secure

Guards do not make you securePasswords do not make you secure

 

Incident Response is a Capability that enables them to make you

MORE secure

 

Page 42: Incident Response

Questions?

Email:[email protected]

Slides:http://winterstorm.ca/download/