Top10 ConsiderationsForIncidentResponse
Top10 ConsiderationsForIncidentResponse
Technical Reviewers
Jordan Lewis
Version 2.0
2December2015
Table of Contents.
1. Introduction.
2. Consideration 1: Audit and Due Diligence.
3. Consideration 2: Create a Response Team.
4. Consideration 3: Create a Documented Incident Response Plan.
5. Consideration 4: Identify your Triggers and Indicators.
6. Consideration 5: Investigate the Problem.
7. Consideration 6: Triage and Mitigation.
8. Consideration 7: Recovery.
9. Consideration 8: Documentation and Reporting.
10. Consideration 9: Process Review.
11. Consideration 10: Practice , Practice , Practice.
12. Conclusion.
1 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
1. Introduction
A Security
incident is an identified occurrence or weakness indicating a possible breach of security
[1]
policies or failure of safeguards, or a previously unknown situation which may be security relevant.
Organizations are susceptible to different types of attacks which might be simple or sophisticated in
nature and attack vectors such as attempted hacks, viruses, and trojans keep evolving at a pace that
calls for constant vigilance. Incidents have the potential to affect the confidentiality, integrity and
availability of information or services provided by an organization.
The answer is straightforward. Any challenge or problem which is not properly contained and
handled can and will spiral into bigger problems that can eventually lead to the total collapse of the
system.
Incidents
will occur even in environments that are adequately prepared for it.
A competent Incident Response operation will help to
● Minimize loss.
● Mitigate the weaknesses that were exploited.
● Restore services and processes.
● Reduce the risk that can occur from future incidents.
2 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
Our advice is that you do a comprehensive audit or review of your constituency in order to
have a very good picture of where the organization stands.
3 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
4 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
You might also consider Vendors and Third party Service Providers whose activities are relevant
to
Incident Management . They should help you to respond to incidents in a faster, more
effective manner.
Other members of the team can be a Public Relations Officer, Legal Adviser and a Risk
Assessment officer.
In summary there are some important things to note when creating an Incident Response
Team .
● Ensure that you have a competent Team Leader who is in charge and has a clear chain
of command. Document the roles and responsibilities of the team members and
communicate this clearly to all relevant stakeholders. This will ensure that the work
flows smoothly along clearly established reporting lines.
● Team members should have sufficient authority to respond to task and challenges
within their jurisdiction. They should also be encouraged to work actively with other
internal and external team members as the overall objective is to respond efficiently to
incidentsthat affect the organization as a whole.
Remember, the major task of the Incident Response team is to classify an incident , investigate
and contain the incident and also ensure proper documentation where applicable. A team is
only as strong as it’s weakest link. Ensure that all team members realize how important their
roles are and review performances and contributions accordingly. Ideally you should have
backups for these roles when the team members are unavailable.
5 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
6 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
● Gathering , reviewing and detailed analysis of all information concerning the incident,
● Adequate checks on equipment for malfunctions and vulnerability that may have led to the
incident.
● What information (if any) has been disclosed to unauthorized parties, deleted or corrupted.
● Identifying the potential business impact of the incident: i.e. Business Interruption , Financial
Loss.
● Other investigative procedures to be carried out like Forensics , Prosecution etc
For example , if the Incident has to do with a compromised equipment within a network, it will be
advisable to determine which equipment was compromised, if the compromise came from an
external or internal source. If it is determined that the incident merits probable legal action,
preserving the evidence in its original form will be a crucial requirement. The Legal Counsel will
recommend proper steps for documenting the evidence and collaborate with Law enforcement
agencies where necessary.
8. Consideration 7. Recovery.
Once a thorough investigation has been carried out, recovery is a significant step for restoring
whatever services or materials might have been affected during an incident. This could be the task of
the technical people in the team. The recovery step is the transition from active incident to standard
monitoring. The recovery procedure should include the steps for transition given the specifics of the
firm’s environment and approach.
It is important that after an incident has been contained, key components that contributed to the
incident should be eliminated. For example, when returning a compromised machine to production,
is it acceptable to clean infection residue or should the machine in question be wiped cleaned,
formatted and rebuilt from known reliable media?
Other practical recovery responses can include:
7 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
· Who has been informed about the incident and action steps taken.
Some other points to consider in reporting and documentation is briefing the management about the
incident in a timely fashion. Management should be notified immediately when an important incident
is detected. Briefing is a critical action in reporting as it provides the management an overview of the
situation which can help define the obligatory course of action.
As more information becomes available throughout the response process, additional briefings and
updates should occur at regular intervals.
8 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
Sometimes, there is a considerable amount of information generated from incidents that occur within
an organization and you can share information with external vendors or trusted service providers in
a bid to educate them and also receive helpful information from them when the need arises.
Note that sharing information should be on a ‘need to know’ basis and it is advisable for organizations
to involve the Legal Counsel expert when creating reports so that factors such as regulatory
obligations, contractual obligations, and insurance obligations are properly considered as an incident
investigation proceeds. All team members should be trained in a common lexicon of language to
guarantee prompt and clear communication during incident response.
12. Conclusion
An incident is considered to be any adverse event that threatens the progress, integrity or
availability of your organization’s objectives or resources. Encourage your
Incident Response Team
to take part in external events, such as by attending conferences, enrolling in training and other
helpful activities.
9 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project
Incident Response cuts across the whole organization and should not just be restricted to the IT unit
or particular units.
It should be clearly communicated that an organization’s fundamental business or service delivery
can be endangered when incidents occur. It is the mandate of an efficient I
ncident Response Team to
prevent , handle, resolve and adequately document incidents that may arise.
Incident Recovery is a significant tool of overall governance and to have it, in whatever form or
shape, is a necessity. This fact is acknowledged and supported in the ISO 27001 security standards
and in frameworks such as ITIL and COBIT.
References.
1. An empirical study on the use of the Generic Security Template for structuring the lessons from
information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem
Jebriel. School of Computing Science University of Glasgow,Glasgow, UK
● URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_s
tudy_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_info
rmation_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf
5. Local Government Cyber Security :Cyber Incident Response Guide,A Non-Technical Guide
Essential for Elected Officials ,Administrative Officials and Business Managers by MS-ISAC
● URL:http://msisac.cisecurity.org/members/local-government/documents/finalincidentrespons
eguide.pdf
10 of 11
https://www.owasp.org/index.php/OWASP_Incident_Response_Project