Microsoft Word - FIRST CSIRT Services Framework
Microsoft Word - FIRST CSIRT Services Framework
ANNEX 1: ACKNOWLEDGMENTS 59
The mission and purpose of the CSIRT Services Framework is to facilitate the establishment and
improvement of CSIRT operations, especially in supporting teams that are in the process of choosing,
expanding, or improving their service portfolio. The services described are those potential services a
CSIRT could provide. No CSIRT is expected to provide all described services. Each team will need to
choose services that support their mission and constituents, as described by their mandate.
The Framework seeks to assist teams by identifying and defining core categories of services and their
sub-components. This includes a title and description for each service, sub-service, function, and
optionally sub-function – as appropriate. This document is a starting point to provide a consistent
service framework that identifies a standard set of terms and definitions to be used across the
community. Note that this document does not explain how to build or improve a CSIRT or
corresponding team. This type of information is available in other documents, some of which are listed
in Annex 1 as supporting resources.
This version of the CSIRT Services Framework replaces all previous versions. It makes no suggestions or
recommendations about capability, capacity, maturity, or quality for any particular type of CSIRT. Such
topics are important for the value provided by any CSIRT towards its constituency, but were
intentionally not included in this framework document. Also, this framework does not look at
implementation or propose a specific way to implement any particular service. It is important to
understand that these services can be implemented in many different ways, while still ensuring that
reasonable expectations of constituents and stakeholders are met.
A properly deployed CSIRT has a clear mandate, a governance model, a tailored services framework,
technologies, and processes to provide, measure, and continuously improve defined services.
Since then, a similar approach has been taken to develop a Product Security Incident Response Teams
(PSIRT) Services Framework in recognition of many operational aspects that require a different set of
services and corresponding activities. All Services Frameworks can be found on the FIRST website.1
This is an improved version of the second version of the CSIRT Services Framework. Based on the
feedback by several experts on the first version, this edition has been restructured and expanded
where necessary. In particular, the internal activities have been removed as those do not constitute
service offerings to constituents. Internal and external activities supporting the full life cycle of any
service offering can be organized in services and functions just like services designated to be provided
to constituents. Those services and functions are mostly known as Support Services. Some examples
would be administrative activities like managing staff and hiring, travel reimbursements, or the
organization of training events.2
Based on our knowledge there are many different ways to provide such Support Services, and most are
depending on the organization hosting the CSIRT or related service offerings. For example, hiring and
managing of staff is surely required in supporting the CSIRT, but is considered a typical organizational
support task and not specific to CSIRTs.
1
https://www.first.org/standards/frameworks/csirts/ for CSIRT related materials
2
Check [Kossakowski 2001] for a discussion of internal support services and its relationship to other services
As CSIRTs will continue to face the ever-changing challenges to keep their constituents secure against
new emerging threats, the services covered by this framework will be reviewed, vetted, and extended
or amended as needed in future versions.3
Inside an organization, an Enterprise CSIRT is focused on the security of computer systems and
networks that make up the infrastructure of an organization. If there are multiple security teams and
CSIRTs inside a large organization, one of them might serve as coordinator and single point of contact
to the external parties. Such teams are called Coordinating CSIRTs.
Such Coordinating CSIRTs are also established as independent entities serving a specific set of
individuals and/or organizations known as a constituency. Organizations belonging to a specific
constituency share some common characteristics (like being part of a national research network or
belonging to a specific country). The Coordinating CSIRT acts as single point of contact for the whole
group and is focused on the overall security aspects of these organizations.
Today, national CSIRTs have been established as a distinctive type of Coordinating CSIRT to facilitate
and often coordinate the activities of CSIRTs located in a particular nation or offer limited services for
all citizens, specific sectors of critical infrastructure entities, etc. of this nation.
While there are important differences between any CSIRT and PSIRT, it is important to recognize that
there is also synergy between the two entities. The important point to take away is that both CSIRTs
and PSIRTs do not operate independently of each other, as, for example, many CSIRTs warn
constituents about security vulnerabilities. Such warnings are almost always based on information
provided by vendor PSIRTs.
3
A FIRST Special Interest Group (SIG) has been established to steer the “CSIRT Framework Development”.
SERVICES
A service is a set of recognizable, coherent functions oriented towards a specific result. Such results
may be expected or required by constituents or on behalf of or for the stakeholder of an entity.
FUNCTIONS
A function is an activity or set of activities aimed at fulfilling the purpose of a particular service. Any
function might be shared and used in the context of several services.
SUB-FUNCTIONS
A sub-function is an activity or set of activities aimed at fulfilling the purpose of a particular function.
Any sub-function might be shared and used in the context of several functions and/or services. Sub-
functions might be optionally performed or required for any of those functions and/or services.
For the purpose of the CSIRT Services Framework no sub-functions have been fully described. Only a
short characterization is given for each one.
Below figure displays (next page) the CSIRT Services Framework Service Areas and Services. A full table
of service areas, services and functions is available as Appendix 4.
The following services are considered as offerings of this particular service area:
Description: Based on logs, NetFlow data, IDS alerts, sensor networks, external sources, or other
available information security event data, apply a range of methods from simple logic or pattern
matching rules to the application of statistical models or machine learning in order to identify potential
information security incidents. This can involve a vast amount of data and typically, but not
necessarily, requires specialized tools such as Security Information and Event Management (SIEM) or
big data platforms to process. An important objective of continuous improvement is to minimize the
number of false alarms that need to be analyzed as part of the Analyzing service.
Outcome: Potential information security incidents are identified for analysis as part of the Analyzing
service.
The following functions are considered to be part of the implementation of this service:
Description: Sensors and log sources need operational management throughout their lifecycle. They
must be deployed, onboarded, and decommissioned. Outages, data quality/scope, and configuration
4
Although this services framework does not aim to define a SOC services framework, it is certainly expected that
services from both Information Security Event and Incident Management areas will be useful and directly
applicable while defining SOC services.
Outcome: A reliable stream of relevant information security events is available as input for detection
use cases.
Description: New detection approaches are developed, tested, and improved, and eventually
onboarded into a detection use case in production. Instructions for analyst triage, qualification, and
correlation need to be developed, for example in the form of playbooks and Standard Operating
Procedures (SOPs). Use cases that do not perform well, i.e., that have an unfavorable benefit/effort
ratio, need to be improved, redefined, or abandoned. The portfolio of detection use cases should be
expanded in a risk-oriented way and in coordination with preventive controls.
Outcome: A portfolio of effective detection use cases that are relevant to the constituency is
developed.
Description: The various contextual data sources that are involved in detection and enrichment need
to be managed throughout their lifecycle. These can be live APIs to or exports from other IT systems
such as a Configuration Management Database (CMDB), Identity and Access Management (IAM), or
Threat Intel systems, or entirely separate data sets that need to be managed manually. The latter
would be the case for indicator lists, watchlists and whitelists to suppress false positives.
Outcome: Up to date contextual data is available for both detection and enrichment.
Description: The flow of detected potential information security incidents must be triaged and each
one qualified as an information security incident (true positive) or as a false alarm (false positive) using
manual and/or automated analysis. This may require manual or automated gathering of additional
information, depending on the detection use case. Priority should be given to the analysis of
potentially more critical information security incidents to ensure timely reaction to what is most
important. Structured qualification of detected potential information security incidents enables
effective continuous improvement in a directed way by identifying detection use cases, data sources,
or processes with quality issues.
The following functions are considered to be part of the implementation of this service:
• Correlation
• Qualification
Description: Potential information security incidents pertaining to the same assets (e.g., systems,
services, customers) or identities (e.g., users), or which are otherwise directly related to other
potential information security incidents are grouped together and escalated as a single information
security incident in order to avoid duplicate efforts. New potential information security incidents
directly related to ongoing information security incidents are assigned to that information security
incident instead of opening a new, separate information security incident.
Outcome: Grouping of related potential information security incidents for combined qualification or
updating to an existing information security incident already handled by the Information Security
Incident Management service area is performed.
Description: Potential information security incidents need to be triaged and each qualified as an
information security incident (true positive) or as a false alarm (false positive). Because analysts have a
limited number of potential information security incidents they can analyze, and in order to avoid alert
fatigue, automation is key. Mature tooling facilitates effective triage by enriching with context
information, assigning risk scores based on the criticality of affected assets and identities and/or
automatically identifying related information security events. Recurring cases that can be automated
should be identified and automated. Potential information security incidents with higher criticality
should be analyzed before less critical ones. In addition to qualification as true or false positives, a
more fine-grained qualification is an important input for continuous improvement of detection use
cases as well as the management of log sources, sensors, and contextual data sources. More fine-
grained qualification can also support the definition of higher-quality KPIs for measuring the success of
this service area.
Outcome: Qualified potential information security incidents are available for handling as part of the
Information Security Incident Management service area.
From this analysis, mitigation and steps to recover from the incident can be recommended, and
constituents will be supported in applying the recommendations. This also requires a coordination
effort with external entities such as peer CSIRTs or security experts, vendors, or PSIRTs to address all
aspects and reduce the number of successful attacks later on.
The special expertise CSIRTs can provide is also critical in addressing (information security) crises.
While in many instances a CSIRT will not handle the crisis management, it can support any such
activity. Making its contacts available, for example, can greatly improve the application of required
mitigation steps or better protection mechanisms.
Applying the knowledge and the available infrastructure to support its constituency is key to improving
overall information security incident management.
The following services are considered as potential offerings of this service area:
Description: For a CSIRT, the most important task is the acceptance of reports about information security
events and potential information security incidents affecting networks, devices, components, users,
organizations, or infrastructure—referred to as the “target”—inside the constituency. The CSIRT should
anticipate that potential information security incidents may be reported from various sources in various
formats, both manually and automatically.
To enable constituents to report information security incidents more effectively, the CSIRT should
provide one or more mechanisms as well as guidance or instructions on what and how to securely
report information security incidents. Reporting mechanisms can include email, a website, a dedicated
information security incident reporting form or portal, or other appropriate methods to enable reports
to be submitted safely and securely. Reporting guidance, if not included as part of an information
security incidents reporting form itself, should be provided in separate documentation or via a
Outcome: The information security incident report is received with professional and consistent intake
of each report as well as its initial validation and classification.
The following functions are considered to be part of the implementation of this service:
• Monitoring communications channels regularly and check whether the advertised means of
contacting the CSIRT are operational and reports can be submitted
• Reporting initial acknowledgement to the submitter of the information security incident
report, requesting additional information if needed, and setting expectations with the reporter
5
As is to be expected for all services related to the intake of information and data, there are many similarities. It
is therefore common to combine such services from several service areas offered into one service/function. As
this is not mandatory and there is no set combination of service areas, we have chosen to keep such services
separate within the CSIRT Services Framework, although each team is free to choose the best organizational
model for its own setup.
It is possible that attacks may originate from within the constituency of a CSIRT, may target this
constituency, or the constituency is affected by collateral effects only. If the CSIRT does not provide
Information Security Management services for the identified targets, then the report should be
forwarded securely to an external group for handling, such as the affected organization(s) or CSIRT(s).
Unless there is a reason to decline an information security incident report or the report has been
forwarded to another entity responsible for its handling, the report should be passed on to the
Vulnerability Analysis service for further review, analysis, and handling.
Outcome: It can be determined if a reported matter is indeed an information security incident that needs
to be handled by the CSIRT or passed on to a relevant entity.
The following sub-functions are considered to be part of the implementation of this service:
• Processing reports and submitted data including artefacts or materials in isolation to protect
the integrity of the working environment and avoid successful attacks on the CSIRT by such
means
• Updating acknowledgement of reports by providing some feedback on further steps based on
categorization or prioritization results available
• Merging new information about already handled information security incidents to the
available data to allow a consistent analysis and processing
Description: This service consists of functions to gain an understanding of the information security
incident and its actual and potential impact to identify the underlying issues or vulnerabilities or
weaknesses (root causes) that allowed the successful attack, compromise, or exploit.
Detailed analysis is often complex and time-consuming. The objective is to identify and characterize the
information security incident in as much detail as required or justified by the current understanding of
its impact. Information security incidents can be characterized by scope, affected entities, tools, or
attacks deployed, timelines, etc. This service may continue in parallel while the Information Security
Incident Coordination service and functions are occurring, or mitigation/recovery actions are taken.
Outcome: Knowledge is increased of the key details of an information security incident (e.g., description,
impact, scope, attacks/exploits, and remedies).
The following functions are considered to be part of the implementation of this service:
Description: The Analyzing Information Security Incidents service begins with a review of the available
information to categorize, prioritize, and assess the impact an information security incident has on the
involved systems relevant to the CSIRT’s mandate. Some of this may have been documented during the
Information Security Incident Report Triage and Processing function (of the Information Security
Incident Report Intake service) if the information security incident was reported to the CSIRT by a
constituent or third party.
If prior triage has not already been completed, the information security incident may be assigned to a
subject matter expert who can provide technical confirmation that it has some impact on the involved
systems and is relevant to the CSIRT’s mandate (i.e., a potential security impact on networks or systems
that can result in damage to the confidentiality, availability, or integrity of information assets in an area
the CSIRT according to its mandate).
Outcome: The information record of an information security incident is categorized, prioritized, and
updated.
Description: Enable the collection of all valuable information to obtain the best understanding of the
context, so that the origin and the content of the information can be appropriately evaluated and tagged
to be used for any further processing.
While collecting information, the agreed sharing policies and limitations of what data can be used in
which context or for what form of processing must be accepted and adhered to. Also, the collection
Outcome: Structured information about collected digital and non-digital data or metadata is available,
with tracking information and points of control of the integrity of both handling and storage. Depending
on whether the results will be used for future (informal) analysis or law enforcement activities, different
requirements exist in regard to establishing a formal chain of custody that can be defended in court at
some later stage.
The following sub-functions are considered to be part of the implementation of this function:
Outcome: A list of pending and—from the viewpoint of the incident handler coordinating the response
to any given information security incident—outsourced analysis is available.
Description: This function involves the correlation of available information about multiple information
security incidents to determine interrelations, trends, or applicable mitigations from already closed
information security incidents to improve the response to currently handled information security
incidents.
Outcome: The bigger picture is understood in terms of situational awareness based on a detailed
knowledge about similarities and confirmed or suspected interrelationships of otherwise independent
information security incidents.
Description: The services related to the understanding of the capabilities and intent of artefacts (e.g.,
malware, exploits, volatile memory dumps or disk copies, applications codes, logs, documents), their
delivery mechanisms, their propagation, their detection, their mitigation, and their disarming or
neutralization. This applies to any formats and sources: hardware, firmware, memory, software, etc. Any
artefact or evidence must be preserved and collected without any modification and kept in isolation. As
some artefacts and data may become evidence in the context of law enforcement activities, specific
regulations or requirements may apply.
Even without preserving a chain-of-custody, this service usually involves complex and time-consuming
tasks, and requires expertise, setting up dedicated and monitored analysis environments--with or
without external accesses from standard wired or wireless networks (such as performing the forensics
activities in a sealed or Faraday room), logging of activities, and compliance with procedures.
As part of the handling of information security incidents, digital artefacts may be found on affected
systems or malware distribution sites. Artefacts may be the remnants of an intruder attack, such as
executables, scripts, files, images, configuration files, tools, tool outputs, logs, live or dormant pieces of
code, etc.
• The context required of the artefact to run and to perform its intended tasks, whether
malicious or not
• How the artefacts may have been utilized for the attack: uploaded, downloaded, copied,
executed, or created within an organization’s environments or components
• Which systems have been involved locally and remotely to support the distribution and actions
• What an intruder did once to access to the system, network, organization, or infrastructure
was established: from passively collecting data, to actively scanning and transmitting data for
exfiltration purposes, or collecting new action requests, updating itself or making a lateral
movement inside a compromised (local) network
• What a user, user process, or user system did once the user account or user device was
compromised
• What behavior characterizes the artefacts or compromised systems, either in standalone
mode, in conjunction with artefacts or components, connected to a local network or the
Internet, or in any combination
• How the artefacts or compromised systems establish connectivity with the target (e.g.,
intrusion path, initial target, or detection evasion techniques);
• What communication architecture (peer-to-peer, command-and-control, both) has been
utilized
• What were the actions of the threat actors, what is their network and systems footprint
• How the intruders or artefacts evaded detection (even over long periods of time which may
include reboot or reinitialization)
Each activity provides additional information about the artefacts. Analysis methods include but are not
limited to identification of type and characteristics of artefacts, comparison with known artefacts,
observation of artefact execution in a runtime or a live environment and disassembling and interpreting
binary artefacts.
In carrying out an analysis of the artefacts, an analyst attempts to reconstruct and determine what the
intruder did, in order to detect the exploited vulnerability, assess damages, develop solutions to mitigate
against the artefacts, and provide information to constituents and other researchers.
Outcome: The nature of recovered digital artefacts and analyzed forensic evidence is understood along
with the relationship to other artefacts, internal or external objects or components, attacks on
frameworks, tools, and exploited vulnerabilities. Working assumptions or proof of what the threat actor
did, and how the artefacts behaved. This knowledge is critical to assess losses, damages, business
List of functions which are considered to be part of the implementation of this service:
Description: This function involves identification and characterization of basic information and metadata
about artefacts, including but not limited to file types, string outputs, cryptographic hashes, certificates,
file sizes, file/directory names. As all available information is gathered and analyzed further, this may be
used to review any public/open or private/closed source information repositories to learn more about
the artefact or its behavior, as such information can be used to determine the next steps.
Outcome: Identify Characteristics and/or the signature of digital artefact are identified, and any
information already known about the artefact including maliciousness, impact, and mitigation.
Description: To provide a deeper analysis of malware artefacts to include identifying hidden actions and
triggering commands. Reverse engineering allows the analyst to dig past any obfuscation and
compilation (for binaries) and identify the program, script, or code that makes up the malware, either
by uncovering any source code or by disassembling the binary into assembly language and interpreting
it. The analyst uncovers all of the machine language exposed functions and actions the malware can
perform. Reverse engineering is a deeper analysis that is carried out when surface and runtime analysis
do not provide the full information needed.
Outcome: Complete functionality of a digital artefact is derived to understand how it operates, how it is
triggered, related system weaknesses that can be exploited, its full impact, and potential damage, in
order to develop solutions to mitigate against the artefact and, if appropriate, create a new signature
for comparison with other samples.
The following sub-functions are considered to be part of the implementation of this function:
• Static analysis
Description: This function involves understanding of an artifact’s capabilities via observation while
running the sample in a real or emulated environment (e.g., sandbox, virtual environment, and hardware
or software emulators).
Use of a simulated environment captures changes to the host, network traffic, and output from
execution. The basic premise is to try to see artefact in operation in as close to a real-life situation as
possible.
Outcome: Additional insight is gained into a digital artefact’s operation by observing its behavior during
execution to determine the changes to the affected host system, other system interaction, and resulting
network traffic in order to better understand the system damage and impact, create new artefact
signature(s), and determine mitigation steps.
Note: Not all functionality is apparent from runtime analysis, since not all code sections may be
triggered. Runtime analysis only allows the analyst to see what the malware does in the test situation,
not what it is fully capable of doing.
The following sub-functions are considered to be part of the implementation of this function:
Description: This function involves exploring an artefact’s relationship to other artefacts. This may
identify similarities in code or modus operandi, targets, intent, and authors. Such similarities can be used
to derive the scope of an attack (e.g., is there a larger target, has similar code been used before).
Comparative analysis techniques can include exact match comparisons or code similarity comparisons.
Comparative analysis provides a broader view of how the artefact or similar versions of it were used and
changed over time, helping to understand the evaluation of malware or other malicious types of
artefacts.
The following sub-functions are considered to be part of the implementation of this function:
Description: Once the analysis has confirmed a potential information security incident and a response
strategy has been developed, this must be turned over into a response plan. Even before a response
plan can be finalized, ad-hoc measures may be taken. This service also includes the initiating and
tracking of all activities which are performed until the information security incident can be considered
closed or new information becomes available that requires further analysis and henceforth may also
change the response strategy and plan.
Outcome: The information security incident is mitigated, and the cyber security posture is improved.
Integrity of systems impacted by the underlying attack or activities of the attacker is restored, as well
as serviceability of the network and systems compromised. Data is restored in case of data loss, if
possible.
The following functions are considered to be part of the implementation of this service:
In the case of a coordinating CSIRT, not all functions will be provided. While “supporting other
information security entities” is an activity such teams provide, they sometimes also help with
“establishing a response plan.”
As with all plans, it must be considered that whenever new analysis results become available, the new
findings need to be reviewed. Indeed, the response plan will usually need to be changed to provide
continuous orientation and guidance. But without such plan—unless the response is handled by one
small organizational group with little requirement of external interfaces or other entities—the
activities might not be carried out effectively or efficiently due to a lack of coordination.
Outcome: An agreed response plan that meets business requirements if aided by available resources
and support, which will then be executed. Tracking and coordination by a CSIRT would be provided by
the “Coordination” service.
The following sub-functions are considered to be part of the implementation of this function:
Description: The immediate challenge in case of an information security incident is to stop it from
spreading. While systems are compromised or malware is active on end user systems, further data
losses and more compromises occur. It is usually the main objective of attacks to reach out to specific
data and systems, including attacks (including but not limited to lateral movements) to other
organizations both inside and outside the organization suffering from the information security
incident. Stopping or at least limiting the extent of any malicious activities or further losses requires
short-term actions such as blocking or filtering traffic and removing access to specific services or
systems and can also result in the disconnection of critical systems.
Denying further access to potentially critical evidence data will allow a full analysis of such evidence.
Denying further access to other systems and networks will also limit the exposure from liability as a
result of damage done to other organizations.
Outcome: Control of systems and networks involved is regained. Access is denied for attackers and
malware to data, systems, and networks in order to avoid more attacks and/or compromised systems
and data.
Description: Restore the integrity of affected systems and returning the affected data, systems, and
networks to a non-degraded operational state, restoring the impacted services to full functionality. As
business reality usually demands systems return to normal operation as soon as possible, there is a risk
that not all means of unauthorized access have been removed successfully. Therefore, unless the
analysis results are already available, even returned systems must be carefully monitored and
managed. Especially if identified vulnerabilities and weaknesses cannot (yet) be eliminated, improved
protection and detection mechanisms need to be applied to avoid the same or similar or types of
information security incidents.
Outcome: Measures are applied to restore the systems and services to full functionality as well as
capacity. Measures are applied to close any detected vulnerabilities or weakness that contributed to
the original information security incident. Detection and reaction measures are improved as
recommended by the analysis and response plan.
The following sub-functions are considered to be part of the implementation of this function:
Description: A CSIRT may provide direct (onsite) assistance to help the constituents to recover from
losses and to remove vulnerabilities. This might be a direct extension of offering analysis services on-
site (see above). On the other hand, a CSIRT might choose to support the staff of the constituents
responding to the information security incident with more detailed explanations, recommendations,
etc.
Outcome: Response of the constituents is improved, and recovery is faster. By adding to the available
body of knowledge the future effectiveness and efficiency of related activities may be strengthened. In
addition, it helps to support those entities inside the constituency that are lacking detailed technical
knowledge to carry out the necessary action to respond.
Description: Being notified and kept informed about the details and ongoing activities in relation to an
information security incident is critical for all stakeholders and organizations involved. As some
activities required for a successful mitigation and recovery might involve management approval, this
requires suitable escalation and reporting functions established before any information security
incident can be handled effectively and efficiently. As the CSIRT analyzes all information as it becomes
available, coordination makes sure that notifications and information reach the right points of contact,
track their responses, and make sure that all parties carrying out activities report back to provide for
accurate situational awareness until the information security incident is considered closed and
requiring no further coordination.
Stakeholders should have avenues to submit questions, check the status of information security
incidents, and report issues to the CSIRT. To engage internal stakeholders, the CSIRT should provide
communications channels to advertise the remediation status of information security incidents. To
engage external stakeholders, the CSIRT should maintain communications channels to other CSIRTs
and CSIRT communities that might provide recommendations or technical support.
Outcome: The response is successfully coordinated based on well-informed entities that contribute to
the response to an information security incident.
The following functions are considered to be part of the implementation of this service:
• Communication
• Notification distribution
• Relevant information distribution
Description: A CSIRT must account for the most accurate audience as communications are crafted and
released. In return, a CSIRT must also be equipped to receive incoming feedback, reports, comments,
and questions from a variety of sources based on its own communication.
The security policy and the information sharing policy may require information to be handled in a strict
manner. The CSIRT must be able to share with stakeholders in a reliable, secure, and private manner,
both externally and internally.
Non-disclosure agreements must be set up as far in advance as possible and communication resources
set up accordingly. As an extension, the concept of “information under embargo” can also be used.
Hence, a retention policy must also be established to ensure that both the data used to craft the
information and the information itself are properly handled, shared, and kept based on constraints—
such as time—until these constraints become void or the information is publicly disclosed.
Communication channels can take multiple forms based upon the needs of stakeholders and
constituents. All information communicated must be tagged according to the information sharing
policy. Traffic Light Protocol may be utilized.
Outcome: All communication channels are available according to the security requirements of all
receiving and sending parties.
The following sub-functions are considered to be part of the implementation of this function:
Description: A security incident touches on many internal and potentially external entities and,
possibly, systems, and networks. As CSIRTs are a central point for receiving reports of potential
information security incidents, they also serve as a hub for notifying authorized points of contact about
them. The notification usually will provide not only the appropriate technical details but also
information about the expected response and a point of contact for any fellow-up.
Description: As the response to an information security incident progresses, more analysis results and
reports from potentially other security experts, CSIRTs, or victims become available.
It may be helpful to pass some of the information and lessons learned on to the Knowledge Transfer
Service Area (if supported) to improve training and technical documents as well as to help create
appropriate awareness, especially if new attacks or incident trends are identified.
Outcome: Available information is distributed to those either responsible for taking part in the
response or requiring to be kept informed about the progress and current status.
By offering bilateral or multilateral coordination, the CSIRT participates in the exchange of information
to enable those resources with the ability to take action to do so or to assist others in the detection,
protection, or remediation of ongoing activities from attackers and help to close the information
security incident.
Outcome: Situational awareness is developed of the current status of all activities and status of the
entities that take part in the response.
Description: Delivering concise and factual information about the current status of activities requested
or carried out in response to an information security incident. Instead of waiting to be pulled for such
information as part of an ongoing coordinated action as required for any successful response, timely
reports are critical to enable effective coordination.
Description: Communicating with the media is unavailable in many cases. While CSIRTs usually try to
avoid such contact, it is important to realize that the media can help to mitigate specific types of
ongoing and large-scale attacks causing information security incidents. For this it is necessary to
explain what is causing the information security incidents and explain the impact on users and/or
organizations. In some cases, a CSIRT might choose to provide this information already in a manner
suitable for release to the public, but this certainly requires specific skills inside the CSIRT not readily
available in most. In any case, if a CSIRT communicates with the media, it must take great care to
simplify the technical issues as much as possible and leave out all confidential information.
Outcome: Factual information providing a clear summary of the ongoing information security incident
is developed including steps to be taken by potential victims or outlining the chosen response strategy
to recover from the information security incident.
As the systems and networks might contribute to emergencies or are required to be available to
respond to a crisis situation, a CSIRT will usually be a critical resource for managing such situations and
provide valuable experience but also the established services and networks of points of contacts.
Outcome: The crisis management team can use the CSIRT’s resources to address the cyber security
aspects of the current crisis. At the same time, the CSIRT’s communication resources can be utilized to
reach out to constituents and external parties to ask for specific support actions or help. It can also be
used to communicate in a trusted way towards constituents, using established communication means
and trusted networks.
The following functions are considered to be part of the implementation of this service:
Description: As the response to a crisis progresses, information must be distributed and disseminated.
As the CSIRT has established such resources for its own purposes, crisis management may see it as
appropriate or necessary to use such resources.
Description: The function involves delivering concise and factual information about the current status
of cyber security inside the constituency. As a crisis might be used to start other attacks or as occurring
attacks might be part of the overall activities leading this crisis, it is very important for the crisis
management team to establish complete situational awareness.
The CSIRT can provide such situational awareness for its services and constituents. This may either be
requested or is expected by standard policies in a time of crisis. In any case, as crisis management is
only successful based on the established information flow as it depends on coordinate resources to
address the most critical aspects of the crisis, reporting must be timely and accurate.
As ongoing information security incidents will require resources to handle them, a decision must be
taken to either discontinue the response for the duration of the incident (and allocate the now
available resources to other areas) or to carry on. Reasonable decisions can only be taken based on the
best situational awareness available.
Outcome: The crisis management team will be apprised of the scope of current activities, actions
already completed, and pending ones. The assessed impact of delays, recommendations and
requested actions are also communicated, allowing to understand the overall impact in regard to the
selected strategy to address the current crisis.
Description: Informing other entities in a timely manner about the impact caused by the crisis on
currently open information security incidents provides a clear understanding of what support can also
be provided by the CSIRT during the duration of the crisis, and makes sure that entities understand
As the crisis management team may decide to postpone the response to an actual information security
incident due to a crisis, such decisions need to be communicated to all entities currently informed and
participating. This is to avoid misunderstandings and further issues that may also lead to a loss of trust
in the CSIRT and/or host organization.
Outcome: Information of the crisis impact on the CSIRT operation is distributed to constituents and
other entities involved with responding to open information security incidents. The expectations of the
CSIRT towards such entities are clearly described and ensure that the information needs of the CSIRT
are clearly communicated.
Few CSIRTs will provide all of these services, but instead will provide only those services in their realm
of responsibility. For example, a CSIRT may limit its services to learning of a new vulnerability from
public sources (Vulnerability Discovery/Research) or from third parties (Vulnerability Report Intake)
and then issue a security advisory to its constituents (Vulnerability Disclosure) when needed, without
necessarily participating in any coordination efforts with product vendors or others who develop a
solution (Vulnerability Coordination) or being involved in directly deploying a fix (Vulnerability
Response).
These functions may be services (or functions) performed by others (e.g., researchers, vendors, PSIRTs,
or third-party specialists) instead of the CSIRT.
6
New vulnerability information received by email may be considered to be an activity of either the Vulnerability
Discovery service, Public Source Vulnerability Discovery function, Vulnerability Report Intake service, or of the
Vulnerability Report Receipt function, depending on the CSIRT’s internal processes or on how broadly the
vulnerability information was distributed.
• Monitor communications channels regularly and check whether the advertised means of
contacting the CSIRT are operational and reports can be submitted.
• Report initial acknowledgement to the submitter of the vulnerability report, request additional
information if needed, and set expectations with the reporter.
• Process reports and submitted data including artefacts or materials in isolation to protect the
integrity of the working environment and avoid successful attacks on the CSIRT by such means.
• Update acknowledgement of reports by providing some feedback on further steps based on
categorization or prioritization results available.
• Merge new information about a vulnerability already being handled with the available data to
allow consistent analysis and processing.
7
See the Vulnerability Coordination and Vulnerability Disclosure service areas for related information on
coordinated vulnerability disclosure (CVD).
This function is typically performed by other entities (e.g., product vendors, PSIRTs).
• Vulnerability notification/reporting
• Vulnerability stakeholder coordination
This Vulnerability Response service and its related functions are usually performed by other specialized
groups within an organization, typically not the CSIRT. This service is also unlikely to be provided by a
Coordinating CSIRT.
8
Although the function and sub-functions for detecting vulnerabilities are sometimes referred to as
“vulnerability management,” this CSIRT Services Framework instead refers to these as part of this Vulnerability
Response service, which is part of the larger service area named Vulnerability Management in this framework.
Outcome: Vulnerabilities are detected through formal processes or tools designed to identify.
The following sub-functions are considered to be part of this function:
• Vulnerability scanning/hunting
• Vulnerability security assessments/penetration testing
This function is typically performed by other entities (e.g., IT service, SOC, third-party specialists,
system owners).
• Data acquisition
• Analysis and synthesis
• Communication
Description: Solicit, collect, determine, and satisfy the constituencies’ information requirements to
achieve awareness of important internal and external relevant activities. This service includes the
logistics of collecting relevant information including news of current events, scheduling future events,
reports and feeds, filtering the collected information, organizing information for use in incident
analysis, prevent, detection, or other activities (such as planning or trending), storing it for later use,
improving its “searchability”, and more. Collected data will be used to determine the preventative
measures needed and to help make informed decisions regarding incident management and
information assurance activities. Without a basic perception of important environmental elements, the
risk of other services forming an incorrect picture increases. CSIRTs will need to establish policy and
procedures, and may employ technology to collect and vet information.
Outcome:
The following functions are considered to be part of the implementation of this service:
Description: The collection, aggregation, and distillation of policy establishes the basis of acceptable
normal activity. The end result is a context that establishes how the constituency, and its
infrastructure is supposed to be operating under acceptable conditions. For organizational CSIRTs,
context includes understanding the organizations acceptable policies, plans, normal operating
conditions, accepted risks, and tradeoffs. Understanding and context establish the basis against which
observations can be evaluated.
Outcome: The acceptable observations that are taking place in the constituency are understood. This
understanding is focused upon changes or impacts to infrastructure and assets.
8.1.2 Function: Asset mapping to functions, roles, actions, and key risks
Purpose: Provide knowledge of existing assets, ownership, baselines and expected activity supports
analysis functions that identify abnormal situational observations.
Description: CSIRT teams need to understand the current cyber security state of a constituency and
have a good understanding of what is acceptable security. They may need to know:
This information helps establish prioritization of assets that are potentially at risk, which can provide
context for incident management activities. The more precise the information available to CSIRT team,
the easier it will be to infer security issues and do something about them. Precise information may
Outcome:
• A list of key functions and the assets that support them; some assets may support multiple
functions
• A list of the roles which perform each function and their equivalent digital role on the asset
• A list of generally permissible actions by each role
• A list of the key risks facing the assets and the functions.
Description: Information and data collection activities extend beyond feeds providing automated
information. Collection includes identifying useful sources such as information-relevant external
activities including news from other constituencies, media sources, and other CSIRTs or security
organizations, internal activities (e.g., organizational changes), technology developments, external
events, political events, attack trends, defensive trends, conferences, available training, and more.
The data collection function supports other services such as Security Event Management, Incident
Management, and Knowledge Transfer. It also supports functions and activities within these services
such as analysis, prediction, response, and risk mitigation. Newly collected information may reveal that
an attack on a constituent is more likely than before. External events may expose information that
identifies new risks to assets for a period of time or require heightened detection activities. Overall the
information helps provide actionable information to aid in decision making and incident handling.
Outcome: Data and datasets are collected and produced to provide an operational or environmental
context that can be used by other services and functions, including analysis, to create a situational
picture for the constituency, identify alerts, or plan for mitigating increased areas of risk to assets and
supporting infrastructures.
Description: Data processing and preparation includes transformation, processing, normalization, and
validation of a set of data. Sources of cybersecurity data need to be validated for accuracy often due to
a high number of false positives. The relevant data also typically comes in different formats, and new
data needs to be combined with historical data before a complete analysis can be performed. Some
types of data (such as news articles) may need to be analyzed or processed as part of the preparation
Some analysis methods require data to be stored in the same format, or for files to have the same
number of records. There are multiple processing steps that may be involved to prepare the data. Data
augmentation (also called enrichment) is performed by including other available information related to
a given piece of data from other internal and external sources. For example, teams may collect
information related to internet protocol addresses (IP addresses) such as autonomous system
identifiers, country codes, or geo-location data. For internal asset information, teams may enrich their
asset inventory data with the name of the asset owner, their role, their permissions on other assets,
their physical working location over time, and more.
Description: The process of using current data, history, and analysis techniques to determine what is
occurring that may impact the constituency assets and security posture, often done by determining an
answer to a question or testing an intuition. Analysis may reveal when events do not match typical
expected behavior, or may reveal information about the circumstance, nature, or origin of events or
behaviors. Analysis may reveal implications to current and future situations. For example: a system
may log that a user ID successfully logged into the system, but the system does not indicate whether
the event was performed by a legitimate user. New sources (such as interviews with the user) will
need to be incorporated into the analysis to provide the team with a more accurate picture to
determine the legitimacy of the event. A variety of techniques may be used to analyze and interpret
the collected data and its effect upon the constituency.
Outcome: A set of conclusions about the probable historical, current, and/or likely future events within
a constituency is produced. It may also include recommendations about certain decisions that a
constituency is facing. Analysis should be supported by evidence such as observation data collected
from sensors and other sources and the interpretation of that evidence by analysts through a variety
of methods. The analysis may also include constituents that need to be told about the results, and
what they need to be told.
The following functions are considered to be part of the implementation of this service:
Description: The process of inferring the current state of a situation and making predictions about the
possible likely near-term pictures based on the status and dynamics of the collected data. Sometimes
the data may quickly show a security issue.
Outcome: The situational picture is updated along with knowledge about when a situational picture
will change and how it might change.
Description: The systematic and often directed searching for anomaly activity inside and outside of
network boundaries based upon external and internal information and trends. To assist the
constituency with analyzing its data from sensors and other sources to draw conclusions about its
environment and situation. For example, if an anti-virus sensor sends an alert of a suspicious file, the
team may analyze the system configuration, the sensor configuration, the file that was alerted, the
user activity at the time, and more, to draw a conclusion about the severity of the observation. This
function may receive significant input from the Security Event Management service area. The
observations from sensors that are used to detect events may be shared among multiple services.
CSIRT teams also need to determine the current situational picture based upon specific pieces of
information about threats. This activity may sometimes be called “threat hunting.” Typically, threat
hunting involves either preparing the environment to detect specific threat activity or searching for
specific threat activity that may already be present.
Outcome: A situational picture is updated based upon the detection of events in the constituency.
Description: Performing analysis of specific evidence assists in identifying insights to support incident
resolution. Sometimes, CSIRTs may focus their situational analysis to support a specific desired
outcome such as incident resolution. Certain responses to an incident may affect a situational picture
differently, and responders may ask for analysis (e.g., impact, cost, risk of failure) of choices. The
decision-making needs of the constituency may change as their situational picture evolves, and the
CSIRT team may initiate new analysis processes to assist them. This activity is related to the Incident
Management Service Area. Incident Management functions are supported by Situational Awareness
and the situational picture may change based upon Incident Management activities.
Outcome: Situational awareness is enhanced for incident management functions based upon new
observations. Updated situational picture based upon incident management activities.
Description: This function identifies the impact a projection or inference may have upon a current or
near-term future situation. An impact may include raising or lowering certain risks such as data loss,
system downtime, or effects on data confidentiality/availability/integrity.
Outcome: An analysis is produced of the likely possible impact that an inference or projection may
have upon a situation.
Description: The knowledge obtained from situational awareness must be communicated to the
constituency. This will allow it to react to observations and to take actions that will improve defensive
situations, e.g., reducing third-party risk by improving the security environment at certain high-risk
suppliers.
Outcome: Accurate, actionable, and timely situational information is delivered to constituency so they
can better understand their past and improve their current and future situational picture.
The following functions are considered to be part of the implementation of this service:
Description: Once the results of Analyze and Interpret are complete, they can be used to improve
decision-making via both internal and external communication processes. Specific pieces of
information are distributed based upon who needs to know them. Communication includes the
method of delivery and the content that is being delivered. A CSIRT team might communicate new
information and how it will change the situational picture. An example of this would be reporting the
expected change a new malicious technique it has observed during an incident would have upon a
constituent member. It may also include trend information such as the most useful sources of
enrichment data and steps in which constituents can use it to improve their own situational
awareness.
Description: Reports and recommendations should clearly indicate the choices and actions faced by
constituents, and include analysis of the expected consequences of each choice or action.
Communication of findings should include a list of evidence supporting the analysis and the
recommendation (if a recommendation is made). The methods used to create the findings should be
clearly explained to the audience so they can also judge the claims presented. The CSIRT team may
create reports on a single event, a series of events, trends, patterns, possible events, or more to
support the needs for their constituency to understand a situational picture.
Outcome: The capability to provide accurate, timely, and complete reports on the situational picture,
the evidence that supports the conclusions, and/or recommendations on possible courses of action
and their potential effects to the constituency is improved.
Description: In some instances, a CSIRT team may also perform the recommended adjustments to
parts of the security infrastructure, for example changing the firewall rules on a particular honey pot
based upon situational analysis.
Description:
• using the results of the analysis service in internal and external planning and decision-making
processes
• identifying the right targets to receive the information
• making the analysis results available
• ensuring the delivery is successful
• tracking and reporting on the sharing of information
Outcome: Situational Awareness Analysis outputs are used as inputs (both internally and among
constituents) into in key decision processes e.g., threat hunting, incident analysis, resolution. Outputs
are disseminated as part of handling or detecting incidents. Information and data coming from
Situational Awareness can also become Best Practices, Reports, Training and Awareness Material
through the Knowledge Transfer service area.
Description:
Outcome: Assurance is provided that the right information is being shared, and that once shared, it is
received by partners, constituents, and other community members. Reports are provided on sharing
activity.
Description: This function involves providing and receiving feedback on information provided,
received, and used by the constituency, other service providers or other stakeholders. Was the
information received accurate, applicable, timely, strategic, new/novel, etc.? Was it helpful in
resolving an investigation? Did it lead to a new insight? This may mean providing information also to
other CSIRT (as an external source) on the usefulness of or changes to signatures, honeypot findings,
IOCs, warnings, threat information, mitigations, etc. This activity may also be performed by the
Knowledge Transfer service area. If so, the results should be communicated back to the Situational
Awareness service area.
Outcome: Observations and feedback is provided to internal and external sources in order to improve
the accuracy, timeliness, quality, and usefulness of information received.
The following services are considered as offerings of this particular service area:
• Awareness building
• Training and education
• Exercises
• Technical and policy advisory
Description: This service includes working with the constituency, experts, and trusted partners to raise
the collective understanding of threats and actions that can be taken to prevent or mitigate the risks
posed by these threats.
• events, activities, and trends that may affect its ability to operate in a timely and secure
manner
• steps to take to detect, prevent and mitigate threats and malicious activity
• security and operational best practices
The following functions are considered to be part of the implementation of this service:
Description: This function involves researching and aggregating information relevant for building
awareness materials and reports, including from outcomes of other services/functions, especially from
the Security Event Management, Incident Management, and Situational Awareness service areas.
Outcome: Information about relevant trends, ongoing incidents, and best practices, is aggregated and
can be used to develop reports and awareness materials for varied audiences.
Description: This function involves developing materials for diverse audiences (technical staff,
management, end users, etc.) and in various formats, such as presentations, short videos, cartoons,
booklets, technical analysis, trend reports, and annual reports.
Outcome: CSIRT reports and awareness materials of adequate quality are developed to meet the
needs of the constituency utilizing varied and effective delivery techniques and platforms.
Description: The function involves implementing a process of information dissemination that can help
the CSIRT to best deliver its reports and awareness materials to its constituency based on the
characteristics of different audiences and content.
Description: This function involves building partnerships, promoting cooperation, and engaging key
stakeholders, internal or external to the constituency, with the goal of: disseminating awareness and
best practices; helping the constituency and external stakeholders understand the services and
benefits a CSIRT can provide; helping the CSIRT to better understand constituents’ needs; and enabling
the realization of CSIRT’s mission. This may involve ensuring interoperability or fostering collaboration
between or across organizations.
Outcome: Active and consistent outreach activities are performed that may include, but are not
limited to, meeting with key stakeholders, participating in sector meetings, presenting at conferences,
and organizing conferences.
This can be done through various types of activities including documenting the knowledge, skills, and
abilities (KSAs) required, developing educational and training materials, delivering content, mentoring,
and professional and skill development. Each of these activities will collectively contribute to the
constituency’s and the team’s capabilities.
Outcome: A consistent training and education program is provided that enables the CSIRTs’
constituency to appropriately acquire
The following functions are considered to be part of the implementation of this service:
Description: The function involves collecting knowledge, skill, and ability (KSA) needs and the
competence of a constituency in regard to determining what training and education should be
provided.
Outcome: Constituency KSA needs are characterized and documented to be used as basis for
developing relevant education and training materials.
Outcome: CSIRT training and education materials utilizing varied and effective presentation techniques
and platforms are developed that are of appropriate quality and that meet the needs of the
constituency.
Description: This function involves the transfer of knowledge and content to “students.” This can occur
via various methods, such as computer-based/online training (CBT/WBT), instructor-led, virtual,
conferences, presentations, labs, capture the flag (CTF) competitions, books, online videos, etc.
Outcome: A content delivery framework has been designed to help the constituency learn technical
and soft skills and processes, using all alternative approaches, including books, booklets, online videos,
presentations, hands-on labs, CTFs, CBT/WBT, in-person training, etc. This results in constituency
members who understand the content delivered.
Description: A Mentoring program can help provide a formal as well as informal mechanism for the
mentor to share with the mentee about education and skill development, insights, and life and career
experiences outside of the official reporting relationship and structure of the team. This can involve
on-site visits, rotation (exchange), shadowing, and discussing rationale for specific decisions and
actions.
Outcome: Retention, loyalty, confidence, and overall ability to make sound decisions has been
increased in the CSIRT team. Constituents have improved skill levels and a better relationship with its
CSIRT. Improved capacity and capability of the constituency and the CSIRT team members, including
the development of trusted relationships.
Description: Once the appropriate skills have been identified, professional development is used by a
CSIRT to promote a continuous process of securing new knowledge, skills, and abilities that relate to
the security profession, unique job responsibilities, and the overall Team environment. This can
include attending conferences, advanced training, and cross-training activities, among others.
Outcome: Developed and trained staff are available with the requisite technical and soft skills and
process understanding, and who are up to date based on the job roles and needs. CSIRT members are
ready to address the daily operational challenges, supporting both the team and its customers.
Description: Services are offered by the organization to constituents that support the design,
execution, and evaluation of cyber exercises intended to train and/or evaluate the capabilities of
individual constituents and the stakeholder community as a whole, including communications
capabilities. These types of exercises can be used to
• test policies and procedures: assess whether there are sufficient policies and procedures in
place to effectively detect, respond and mitigate incidents. This is, generally, a paper/table-top
exercise.
• test operational readiness: assess whether the organization has an incident management
capability that is able to detect, respond to and mitigate incidents in a timely and successful
manner, as well as to test whether the right people are in place, directories are up-to-date,
and if procedures are executed correctly.
This service addresses both the needs of the organization and the needs of its constituents. More
specifically, through the simulation of cybersecurity events/incidents, exercises can be used for one or
several objectives:
o Exercise: Provide an opportunity for staff to use tools, techniques, and procedures they
are expected to be knowledgeable about. Exercising is necessary for perishable skills and
helps improve and maintain efficiency.
o Assess: Analyze and understand the level of effectiveness and efficiency of cybersecurity
services and functions, as well as the level of staff preparedness.
Outcome: The effectiveness and efficiency of cybersecurity services and functions is improved and
opportunities for further improvements are identified.
The following functions are considered to be part of the implementation of this service:
• Requirements analysis
Description: Determine the learning objectives and scope of the exercise. Define the specific services,
capabilities, and topics to be covered by the exercise. Ensure exercise includes activities and topics
that relate to required or desired skills needed by the participants, as well as the processes that should
be tested.
Outcome: A description of the purpose of the exercise is determined, along with an outline of the
learning objectives to be met.
Description: Define the format and platform needed to meet the objectives and deliver the expected
outcomes of the exercise.
Outcome: The type of exercise (table top, hands-on, simulation, etc.) is identified, as well as the
internal and external resources needed to conduct the exercise.
Outcome: A main scenario with variants and various types of formalized injects is developed, along
with tasks and role allocation to the exercise management team.
Description: The function involves performing readiness testing of constituent “students” to test their
ability to apply training and perform job or task functions. Can be in the form of real or virtual
environments, simulations, field tests, table tops, mock scenarios, or a combination, with injects being
Outcome: A CSIRT has assessed its preparedness and readiness, ensuring the KSAs, key processes, and
execution all work successfully together, or must be adapted/improved.
Description: Develop an after-action report which includes lessons learned or findings/best practices
from the exercise, and provide an assessment to the stakeholders/management.
Outcome: Deliverables are created highlighting the success of the exercise, areas for improvement,
general findings, and recommended actions to take in order to improve: the organization incident
management capabilities, the CSIRT’s team processes, and the capabilities of individual constituents
and of the stakeholder community as a whole, including communications capabilities and procedures.
Description: Support the CSIRT constituency and key stakeholders, internal or external to the
constituency, in activities related to risk management and business continuity, providing technical
advice as needed and contributing to the creation and implementation of the constituency’s policies,
as well as influencing them to enable the CSIRT to be more effective. Policies are also important in
legitimizing the services of a CSIRT.
The following functions are considered to be part of the implementation of this service:
Outcome: The constituency is able to identify risks and threats and select relevant risk management
options, including appropriate and effective incident management strategies, security controls, or
threat mitigations.
Description: Support the constituency in the activities related to organizational resilience, based on
risks identified.
Outcome: The constituency is able to appropriately implement business continuity and disaster
recovery plans that include and align with the incident management strategies.
Outcome: The constituency is able to develop effective policies, institutionalize policies, and enable
effective incident management strategies.
Description: This function provides support and recommendations for the improvement of
cybersecurity related infrastructures, tools, and services for its constituency, with the goal of
improving the security posture and incident management overall.
Capability - A measurable activity that may be performed as part of an organization’s roles and
responsibilities. For the purposes of the FIRST services framework, the capabilities can either be
defined as the broader services or as the requisite functions.
Capacity - The number of simultaneous process-occurrences of a particular capability that an
organization can execute before they achieve some form of resource exhaustion.
Common Vulnerability Exposures (CVE)10 - A list of entries containing an identification number, a
description, and at least one public reference for publicly known vulnerabilities. Serves as a standard
identifier to reference vulnerabilities.
Common Vulnerability Scoring System (CVSS)11 - A numerical score that reflects a vulnerability’s
severity.
Common Weakness Enumeration (CWE)12 - A formal list of software weakness types created to serve
as a common language for describing software security weakness in architecture, design, or code;
serve as a standard measuring stick for software security tools targeting these weaknesses; and
provide a common baseline standard for weakness identification, mitigation, and prevention efforts.
Constituency - A specific group of people and/or organizations that have access to a specific set of
services offered by a CSIRT.
Contextual Data Source - A source of contextual data that gives context to data points, for example to
an identity, an asset, or an information security event. Specific examples include user databases, asset
inventories, IP repudiation services, or threat intelligence data.
Coordinated vulnerability disclosure - A term used to denote a disclosure process that includes
coordination. Source: ISO/IEC 29147:2018, Terms and definitions.
Coordinator13 - An optional participant who can assist vendors and finders in handling and disclosing
vulnerability information.
Information Security Event - An observable event in an IT environment that is relevant to security; for
example, a user logon or an IDS alert. Information security events typically produce some kind of
evidence, such as an audit record or an entry in a log file, that can be collected and analyzed as part of
the Information Security Event Management service area.
Information Security Incident17 - Any adverse information security event (or set of information
security events) which indicates a compromise of some aspect of user, system, organization, and/or
network information security. The definition of an information security incident may vary between
organizations, but at least the following categories are generally applicable:
Attacks, even if they failed because of proper protection, can be regarded as information security
incident.
Key Performance Indicator (KPI)18 - A measurable value that demonstrates how effectively a company
is achieving key business objectives. Organizations use KPIs at multiple levels to evaluate their success
at reaching targets.
Maturity - How effectively an organization executes a particular capability within the mission and
authorities of the organization. It is a level of proficiency attained either in executing specific functions
or in an aggregate of functions or services. The ability of an organization will be determined by the
extent and quality of established policies and documentation and the ability to execute a set process.
Open Source - Works that are licensed in such a way that they may be freely redistributed and
modified, where the source code is made available publicly, and is freely distributed and does not
discriminate against any persons, groups, or fields of endeavor, and is technology-neutral. Open
Service Level Agreement (SLA) - A contract between a service provider (either internal or external)
and the end user that defines the level of service expected from the service provider.
Stakeholders24 - Individuals or groups that define and modify the service areas or services and ensure
an appropriate service communication strategy and groups who can benefit from services offered.
Tasks - the list of actions that must be performed to complete a specific function.
Vendor25 - A person or organization that developed the product or service or is responsible for
maintaining it.
Vulnerability26 - A weakness in software, hardware, or an online service that can be exploited.
Barford P., et al. (2010) Cyber SA: Situational Awareness for Cyber Defense. In: Jajodia S., Liu P., Swarup V., Wang
C. (eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, 2010. Boston, MA. ISBN
978-1-4419-0140-8_1
https://link.springer.com/chapter/10.1007/978-1-4419-0140-8_1
Boyd, John R. Destruction and Creation. Goal Systems International. September 3, 1976.
http://www.goalsys.com/books/documents/DESTRUCTION_AND_CREATION.pdf
Cartwright, James E. Joint Concept of Operations for Global Information Grid NetOps. United States Strategic
Command. PDF August 10, 2005. Homeland Security Digital Library. August 10, 2005.
https://www.hsdl.org/?view&did=685398
Committee on National Security Systems Instruction CNSSI 4009. Committee on National Security Systems
Website. June 23, 2019 [accessed].
https://www.cnss.gov/cnss/
Cybersecurity Situation Awareness. The MITRE Corporation Website. June 25, 2019 [accessed].
https://www.mitre.org/capabilities/cybersecurity/situation-awareness
Endsley, Mica R. Toward a theory of situation awareness in dynamic systems. Human factors Volume 37. Number
1. March 1995 Pages 32-64.
https://journals.sagepub.com/doi/10.1518/001872095779049543
FIRST Product Security Incident Response Team (PSIRT) Services Framework, Version 1.0, 2018. North Carolina:
First.org, 2018
https://www.first.org/education/FIRST_PSIRT_Service_Framework_v1.0
FIRST Vulnerability Reporting and Data eXchange SIG (VRDX-SIG). 2013-2015. North Carolina: First.org, 2015
https://www.first.org/global/sigs/vrdx/
Guidelines and Practices for Multi-Party Vulnerability Coordination and Disclosure, Version 1.0, 2017. North
Carolina: First.org, 2017
https://www.first.org/global/sigs/vulnerability-coordination/multiparty/guidelines-v1.0
Hawk, Robert. Situational Awareness in Cyber Security. [blog post]. Hawk’s Posts: Security Essentials from Robert
Hawk. June 11, 2015.
https://www.alienvault.com/blogs/security-essentials/situational-awareness-in-cyber-security
Householder, Allen D.; Wassermann, Garret; Manion, Art; King, Christopher. The CERT® Guide to Coordinated
Vulnerability Disclosure. CMU/SEI-2017-SR-022. Software Engineering Institute, Carnegie Mellon University. 2017
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=503330
Jajodia, Sushil, et al., (Eds.). Cyber Situational Awareness: Issues and Research. Part of the Advances in
Information Security book series (ADIS, volume 46). 2010. ISBN 978-1-4419-0140-8
https://link.springer.com/book/10.1007/978-1-4419-0140-8
Kossakowski, Klaus-Peter. Information Technology Incident Response Capabilities. Hamburg: Books on Demand,
2001. ISBN: 9783831100590.
Kossakowski; Klaus-Peter & Stikvoort, Don. A Trusted CSIRT Introducer in Europe. Amersfoort, Netherlands:
M&I/Stelvio, February, 2000.
http://www.ti.terena.nl/process/ti-v2.pdf
Manion, Art & Householder, Alan. Vulnerability Analysis. CERT Coordination Center (CERT/CC). May 30, 2019.
https://vuls.cert.org/
McGuinness, B. &, Foy, L. A subjective measure of SA: The crew awareness rating scale (cars). In Kaber, D.B.;
Endsley, M.R.; p. 286-291. Proceedings of the First Human Performance, situation awareness and automation
conference; user-centered design for the new millennium. Savannah, Georgia, October 2000.
Salerno, John; Hinman, Michael & Boulware, Douglas. Situation awareness model applied to multiple domains. In
Proceedings of the Defense and Security Conference, Orlando, FL, March 2005.
https://www.spiedigitallibrary.org/conference-proceedings-of-spie/5813/0000/A-situation-awareness-model-
applied-to-multiple-domains/10.1117/12.603735.full?SSO=1
Stone, Steve. Data to Decisions for Cyberspace Operations. The MITRE Corporation Website. January 2016
https://www.mitre.org/publications/technical-papers/data-to-decisions-for-cyberspace-operations
Tadda G.P., Salerno J.S. (2010) Overview of Cyber Situation Awareness. In: Jajodia S., Liu P., Swarup V., Wang C.
(eds) Cyber Situational Awareness. Advances in Information Security, vol 46. Springer, Boston, MA. 2010. ISBN
978-1-4419-0140-8
https://link.springer.com/chapter/10.1007/978-1-4419-0140-8_2
West-Brown, Moira J.; Stikvoort, Don; & Kossakowski, Klaus-Peter. Handbook for Computer Security Incident
Response Teams (CSIRTs). CMU/SEI-98-HB-001. Software Engineering Institute, Carnegie Mellon University.
1998.
http://www.sei.cmu.edu/publications/documents/98.reports/98hb001/98hb001abstract.html