Module 5
Module 5
Incident Response Plan (IR Plan): Outlines the steps to take during
and after a security incident.
The transcript does not explicitly cover how to test contingency plans, but it
mentions that testing is a critical part of the process (NIST recommends it).
NIST CP Methodology
CP Policy Components
Champion
Project manager
Team members
Business managers
IT managers
Information security managers
The BIA is the initial phase of CP. It investigates and assesses the impact of
various adverse events on the organization. The key difference between BIA
and risk management is that risk management focuses on preventing
attacks, while BIA assumes that controls have failed and the attack was
successful.
BIA Considerations
Criterion
1 0.25 0.3 0.15
Impact on Impact on Product/Service Impact on Market
Criterion Profitability Delivery Share
(Note: The table is incomplete in the transcript. More rows are needed.)
Impact on
Impact on Impact on Impact on Market Impact o
Process Revenue Profitability Product/Service Share Reputati
Customer Sales 5 5 5 5 4
Production 5 5 5 3 3
Information
Security 3 3 3 3 5
IT Services 4 3 4 2 2
Customer
Services 2 3 2 1 4
Research and
Development 1 1 2 3 3
Employee 1 1 2 1 2
Impact on
Impact on Impact on Impact on Market Impact o
Process Revenue Profitability Product/Service Share Reputati
Support Services
Additional Resource D
Mission/Business Process Required Resource Estimated Costs
Provide Customer Support Trouble ticket and resolution Application server with
(Help-Desk) application and SQL database
🚨 Incident Response 🚨
Performance measures
The NIST Incident Response Life Cycle provides a framework for incident
response. This includes:
Post-incident activities
IR Planning 📝
For each incident scenario, the incident response team (IRT) develops three
sets of procedures:
These procedures are documented and form the core of the IR plan.
The execution of the IR plan usually falls to the CSIRT. While some overlap
may occur, the CSIRT is distinct from the IR planning team (IRPT). It
comprises technical and managerial IT and InfoSec
professionals equipped to diagnose and respond to incidents. The CSIRT's
structure can vary widely; it might be an informal group or a highly
structured team with defined policies, procedures, technologies, personnel,
and data.
Action Co
Perform research
Action C
Post-Incident Activity:
Action Comple
Electronic vaulting
Remote journaling
Database shadowing
Industry best practices suggest following the 3-2-1 backup rule: three
copies of data on at least two different media, with one copy offsite. Regular
backups (daily on-site, weekly off-site) are recommended.
Incident Indicators 🤔
Possible Indicators:
Probable Indicators:
Reported attacks
IDS notifications
Definite Indicators:
Changes to logs
Loss of availability
Loss of integrity
Loss of confidentiality
Policy violation
Law violation
Reacting to Incidents 💥
Other key personnel are notified only after the incident is confirmed
but before external sources learn of it.
Documenting an Incident 📝
As soon as an incident is confirmed and the notification process begins, the
team should start documenting it. The documentation should record the who,
what, when, where, why, and how of each action taken. This serves as a case
study to determine if the right actions were taken and if they were effective.
It can also prove the organization did everything possible to deter the spread
of the incident.
The essential task of IR is to stop the incident and contain its scope or
impact. Incident containment strategies focus on:
Incident Escalation ⬆️
An incident may increase in scope or severity to the point that the IR plan
cannot adequately contain it. Each organization must determine, during the
business impact analysis, the point at which an incident becomes a disaster.
The organization must also document when to involve outside responders.
Once the incident is contained and system control regained, recovery can
begin.
The CSIRT assesses the full extent of the damage to determine what
must be done to restore systems.
Incident damage assessment: The immediate determination of the
scope of the breach of confidentiality, integrity, and availability of
information and information assets.
Preservation
Identification
Extraction
Documentation
Evidentiary Procedures 📜
DR management
Data management
Communications
Vendor contact
Computer recovery
Business interface
Network recovery
Logistics
Storage recovery
Applications recovery
Others as needed
5. Create DR strategies.
Purpose
Scope
Resource requirements
Training requirements
Special considerations
Disaster Classifications ⚠️
Natural disasters
Human-made disasters
Rapid-onset disasters
Slow-onset disasters
Fire
Flood
Earthquake
Lightning
Landslide or mudslide
Hurricane or typhoon
Tsunami
Dust contamination
Planning to Recover 🚧
Name of agency
Follow-up assessment
Crisis Management 🚨
The initial priority in a crisis is the safety of staff, visitors, and the
public.
Violation of policy
Violation of law
Hot sites
Warm sites
Cold sites
Timeshares
Service bureaus
Mutual agreements
Desk check
Structured walk-through
Simulation
Full interruption