Incident Handling and Response in Computer Security
Incident Handling and Response in Computer Security
Introduction
Incident handling and response (IHR) is the process of identifying, managing, and
mitigating security incidents in an organization. A security incident is any event
that compromises the confidentiality, integrity, or availability of an information
system.
<Determining what services the incident response team should provide Staffing
and training the incident response team.
Different types of incidents merit different response strategies. The attack vectors
are:
Other: An attack that does not fit into any of the other categories.
The goal of IHR is to minimize the damage caused by an incident, restore normal
operations, and prevent future incidents.
1. Containment
2. Eradication
3. Recovery
Restoring affected systems to their normal state after the incident. This
may involve restoring data from backups, testing systems, and monitoring
for any lingering threats.
4. Post-Incident Analysis
Legal and Compliance Experts: Ensures that the incident response adheres
to legal and regulatory requirements.
Once an incident response policy creates the CSIRT, the team begins creating
plans and procedures to meet its responsibilities.
Roles of CIRT/CERT
In a world of cloud computing, IoT, and mobile devices, the risk landscape for
organizations has expanded, making incident response even more vital. Advanced
technologies bring about:
Conclusion
(c) CSIRT Response Tools and Resources Part of planning and preparing is putting
together a set of tools and supporting resources that enable the CSIRT when an
incident occurs, including a command center; jump kit; forensics lab (commonly
outsourced); incident response forms with documented procedures and
checklists; and external resource contacts.
A jump kit is a forensics bag of tools a responder can quickly grab and head out
the door. It should contain everything necessary for at least initial response
evidence preservation
1. Journal for taking notes (who, what, when, where, how, and why) about every
facet of the incident, including physical access
7. Faraday bags for immediate collection of cell phones, tablets, and other
wireless mobile devices (http://amzn.to/2qkFuuZ)
The contents of your jump kit will vary from this list depending on whether your
in-house team performs detailed forensics activities or whether you outsource
them. At the very least, your kit should contain items 1 through 11 in the list
above. (iii) Forensics lab Not every organization needs a forensics lab.
You can also use this list when assessing the credibility and effectiveness of a
potential forensics vendor.
• Strong access control to the lab that minimally includes logging authorized
personnel who enter and when
• A server for organizing and retaining investigation results (not connected to the
Internet)
• A lab network isolated (preferably air gapped) from the organization’s network
with an Internet connection separate from the rest of the organization and the
lab administrative network (Internet connection should be only for administrative
systems, never for systems used for evidence analysis or that are evidence
themselves)
• Systems for analysis (virtual is a good idea) running various operating systems: o
Windows desktop o Windows Server o Mac OS o Linux
• Readers for various types of media (e.g., SIMs and flash memory)