0% found this document useful (0 votes)
17 views

Module 5

Module 5 covers the importance of contingency planning (CP) for organizations to manage unexpected adverse events that disrupt operations, highlighting key components such as Business Impact Analysis (BIA), Incident Response Plan (IR Plan), Disaster Recovery Plan (DR Plan), and Business Continuity Plan (BC Plan). It emphasizes the necessity of testing these plans and outlines the NIST methodology for developing a CP document, including the roles of various teams involved. Additionally, the module details the incident response process, including detection, reaction, recovery, and post-incident activities, while providing guidelines for effective incident management.

Uploaded by

theodoralex49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views

Module 5

Module 5 covers the importance of contingency planning (CP) for organizations to manage unexpected adverse events that disrupt operations, highlighting key components such as Business Impact Analysis (BIA), Incident Response Plan (IR Plan), Disaster Recovery Plan (DR Plan), and Business Continuity Plan (BC Plan). It emphasizes the necessity of testing these plans and outlines the NIST methodology for developing a CP document, including the roles of various teams involved. Additionally, the module details the incident response process, including detection, reaction, recovery, and post-incident activities, while providing guidelines for effective incident management.

Uploaded by

theodoralex49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Module 5: Incident Response and Contingency Planning

5.1 🤔 The Need for Contingency Planning

Contingency planning (CP) addresses unexpected adverse events that


disrupt technology use and halt business operations. An organization's ability
to withstand losses from such events hinges on proper planning and
execution. Without a plan, an adverse event can severely damage
information resources and assets, potentially causing irreparable harm. Over
40% of businesses without a disaster plan fail after a major loss (Hartford
Insurance).

5.2 🧱 Major Components of Contingency Planning

Contingency planning encompasses four key components:

 Business Impact Analysis (BIA): Assesses the impact of various


adverse events on the organization. It assumes security controls have
failed and the attack was successful.

 Incident Response Plan (IR Plan): Outlines the steps to take during
and after a security incident.

 Disaster Recovery Plan (DR Plan): Details the procedures for


recovering from a disaster that significantly disrupts operations.

 Business Continuity Plan (BC Plan): Focuses on maintaining


essential business operations during and after a disruptive event.

These components can be integrated into a single unified plan or developed


separately with interlocking procedures.

5.3 🎯 Components of Crisis Management (Not explicitly defined in


this transcript)

This section is not covered in the provided transcript.

5.4 🧪 Testing Contingency Plans

The transcript does not explicitly cover how to test contingency plans, but it
mentions that testing is a critical part of the process (NIST recommends it).

NIST CP Methodology

The NIST recommends these steps for developing a CP document:

1. Develop the CP policy statement.


2. Conduct the BIA.

3. Identify preventive controls.

4. Create contingency strategies.

5. Develop a contingency plan.

6. Ensure plan testing, training, and exercises.

7. Ensure plan maintenance.

CP Policy Components

A comprehensive CP policy should include:

 An introductory statement from senior management.

 The scope and purpose of CP operations.

 A requirement for periodic risk assessment and BIA.

 A description of CP's major components.

 Guidance on selecting recovery options and business continuity


strategies.

 A requirement for regular plan testing.

 Identification of relevant regulations and standards.

 Identification of key personnel responsible for CP.

 A request for support from all organizational members.

 Additional administrative information.

Individuals and Teams Involved in CP

The Contingency Planning Management Team (CPMT) typically


includes:

 Champion

 Project manager

 Team members

 Business managers

 IT managers
 Information security managers

 Representatives from supplemental planning teams (IR, DR, BC, CM)

Business Impact Analysis (BIA)

The BIA is the initial phase of CP. It investigates and assesses the impact of
various adverse events on the organization. The key difference between BIA
and risk management is that risk management focuses on preventing
attacks, while BIA assumes that controls have failed and the attack was
successful.

BIA Considerations

When conducting a BIA, consider:

 Scope: Define the boundaries of the analysis.

 Plan: Develop a structured approach to the analysis.

 Balance: Ensure a comprehensive yet practical assessment.

 Objective: Remain impartial and data-driven.

 Follow-up: Establish procedures for reviewing and updating the BIA.

BIA Stages (According to NIST SP 800-34, Rev. 1)

1. Determine mission/business processes and recovery criticality.

2. Identify resource requirements.

3. Identify recovery priorities for system resources.

Determining Business Process and Recovery Criticality

This involves analyzing and prioritizing business processes based on their


importance to the organization's mission. Each department is evaluated to
determine the importance of its functions. A weighted analysis table and BIA
questionnaires can be helpful tools.

Example Weighted Table Analysis of Business Processes

Impact on Impact on Product/Service Impact on Market


Criterion Profitability Delivery Share

Criterion
1 0.25 0.3 0.15
Impact on Impact on Product/Service Impact on Market
Criterion Profitability Delivery Share

... ... ... ...

(Note: The table is incomplete in the transcript. More rows are needed.)

📊 Business Impact Analysis (BIA) 📊

The Business Impact Analysis (BIA) is a critical process that helps


organizations assess the potential impact of disruptions to their business
operations. This analysis is used to identify the mission/business
processes that are critical to the organization's success.

Weighted Table Analysis

A Weighted Table Analysis is a method used to evaluate the importance of


different business processes. The table below shows an example of a
weighted table analysis:

Impact on
Impact on Impact on Impact on Market Impact o
Process Revenue Profitability Product/Service Share Reputati

Customer Sales 5 5 5 5 4

Production 5 5 5 3 3

Information
Security 3 3 3 3 5

IT Services 4 3 4 2 2

Customer
Services 2 3 2 1 4

Research and
Development 1 1 2 3 3

Employee 1 1 2 1 2
Impact on
Impact on Impact on Impact on Market Impact o
Process Revenue Profitability Product/Service Share Reputati

Support Services

Information Asset Prioritization

Information Asset Prioritization is the process of identifying and


prioritizing the information assets used by an organization's business
processes. This is done to understand the potential impact of a disruption to
these assets.

The presence of high-value information assets may influence the valuation of


a particular business process.

Identify Recovery Resource Requirements

Once the organization has created a prioritized list of its mission/business


processes, it needs to determine what resources would be required to
recover those processes and the assets associated with them.
A Resource/Component Table can be used to organize this information.

Example Resource/Component Table

Additional Resource D
Mission/Business Process Required Resource Estimated Costs

Provide Customer Support Trouble ticket and resolution Application server with
(Help-Desk) application and SQL database

Provide Customer Support 25 Cat5e network drop


(Help-Desk) Help-desk network segment hub

Provide Customer Support 1 laptop/PC per technic


(Help-Desk) Help-desk access terminals browsing software

Customized accounts receivable Application server with


Provide Customer Billing application and SQL database

📈 System Resource Recovery Priorities 📈


The last stage of the BIA is prioritizing the resources associated with the
mission/business processes. This provides a better understanding of what
must be recovered first, even within the most critical processes.

 A simple valuation and classification scale, such as


Primary/Secondary/Tertiary, or Critical/Very
Important/Important/Routine, can be used to provide a quicker method
of valuing the supporting resources.

 Weighted tables can be used to evaluate the importance of different


resources.

📝 Contingency Planning Policies 📝

Contingency Planning Policies provide guidance on the structure of the


subordinate teams and the philosophy of the organization. These policies
assist in the structuring of the plan and define the related roles and
responsibilities for each element of the overall contingency planning
environment.

🚨 Incident Response 🚨

Incident Response is the process of responding to and managing the


aftermath of a security incident. This includes detecting, reacting to, and
recovering from attacks, employee errors, service outages, and small-scale
natural disasters.

Incident Response Policy

A typical Incident Response Policy should include:

 Statement of management commitment

 Purpose and objectives of the policy

 Scope of the policy

 Definition of InfoSec incidents and related terms

 Organizational structure and definition of roles, responsibilities, and


levels of authority

 Prioritization or severity ratings of incidents

 Performance measures

 Reporting and contact forms


NIST Incident Response Life Cycle

The NIST Incident Response Life Cycle provides a framework for incident
response. This includes:

 Detection and reporting of incidents

 Initial response and containment

 Eradication and recovery

 Post-incident activities

NIST Cybersecurity Framework

The NIST Cybersecurity Framework provides a framework for improving


critical infrastructure cybersecurity. This includes:

 Identify: Identify the organization's critical assets and data

 Protect: Implement measures to protect the organization's critical


assets and data

 Detect: Implement measures to detect and respond to security


incidents

 Respond: Respond to and manage the aftermath of a security incident

 Recover: Recover from a security incident and restore normal


operations# Incident Response Planning and Handling

What Constitutes an InfoSec Incident? 🤔

An event is classified as an InfoSec incident if it meets the following


criteria:

 It targets information assets.

 It has a realistic chance of success.

 It threatens the confidentiality, integrity, or availability of


information resources and assets.

It's crucial to remember that incident response (IR) is a reactive, not


preventive, measure, although IR plans often include preventive steps.

IR Planning 📝

The creation of an organization's IR plan typically falls under the


responsibility of the Chief Information Security Officer (CISO) or an IT
manager with security responsibilities. According to NIST SP 800-61, Rev. 2,
a comprehensive IR plan should include:

 Mission, strategies, and goals

 Senior management approval

 Organizational approach to incident response

 Incident response team communication protocols

 Metrics for measuring incident response capability and


effectiveness

 Roadmap for improving incident response capability

 Integration of the program within the overall organizational


structure

Incident Handling Procedures

For each incident scenario, the incident response team (IRT) develops three
sets of procedures:

 Before the incident: Proactive measures and preventative steps.

 During the incident: Actions taken while the incident is ongoing.

 After the incident: Post-incident analysis, recovery, and preventative


measures.

These procedures are documented and form the core of the IR plan.

The Computer Security Incident Response Team (CSIRT) 👨‍💻👩‍💻

The execution of the IR plan usually falls to the CSIRT. While some overlap
may occur, the CSIRT is distinct from the IR planning team (IRPT). It
comprises technical and managerial IT and InfoSec
professionals equipped to diagnose and respond to incidents. The CSIRT's
structure can vary widely; it might be an informal group or a highly
structured team with defined policies, procedures, technologies, personnel,
and data.

IR Actions: A Three-Phase Approach 🔄

Incident response actions are typically organized into three phases:

 Detection: Identifying an incident as early as possible to minimize


impact.
 Reaction: Responding swiftly and effectively to limit the scope and
impact of the incident.

 Recovery: Restoring normal operations and preventing recurrence.

NIST SP800-61, Rev. 2: Incident Handling Checklist ✅

This checklist outlines the steps involved in handling an incident, categorized


into phases:

Detection and Analysis:

Action Co

Determine if an incident occurred

Analyze precursors and indicators

Look for correlating information

Perform research

Begin documenting and gathering evidence

Prioritize incident handling

Report the incident

Containment, Eradication, and Recovery:

Action C

Acquire, preserve, and secure evidence

Contain the incident

Eradicate the incident

Identify and mitigate exploited vulnerabilities


Action C

Remove malware, etc.

Repeat Detection & Analysis if needed

Recover from the incident

Return systems to operational state

Confirm normal system functioning

Implement additional monitoring

Post-Incident Activity:

Action Comple

Create a follow-up report

Hold a lessons-learned meeting

Data Protection for Incident Preparedness 💾

Organizations can employ various methods to protect information and ensure


quick recovery after an incident:

 Traditional data backups

 Electronic vaulting

 Remote journaling

 Database shadowing

Industry best practices suggest following the 3-2-1 backup rule: three
copies of data on at least two different media, with one copy offsite. Regular
backups (daily on-site, weekly off-site) are recommended.

Detecting Incidents: Routine Events vs. Actual Incidents 🧐


Distinguishing routine events from actual incidents is crucial. Failing to
accurately identify an incident can lead to:

 Wasted resources on false alarms.

 Delayed responses to actual incidents, increasing damage.

Incident Candidates and Classification 🔎

Incident candidates are adverse events or abnormalities flagged by


monitoring tools or users. These require further analysis to determine if they
represent actual incidents. Incident classification involves examining an
adverse event to determine if it's a true incident. Reports from users,
intrusion detection systems, antivirus software, and system administrators
help identify candidates.

Incident Indicators 🤔

Indicators can be categorized as:

Possible Indicators:

 Presence of unfamiliar files

 Presence or execution of unknown programs/processes

 Unusual resource consumption

 Unusual system crashes

Probable Indicators:

 Activities at unexpected times

 Presence of new accounts

 Reported attacks

 IDS notifications

Definite Indicators:

 Use of dormant accounts

 Changes to logs

 Presence of hacker tools

 Notifications from partners/peers

 Notifications from hackers


Potential Incident Results:

 Loss of availability

 Loss of integrity

 Loss of confidentiality

 Policy violation

 Law violation

Knowledge Check Activity 2 🤔

Which of these is not a definite indicator that an event is an incident?

a. Use of dormant accounts b. Unusual system crashes c. Changes to logs d.


Presence of hacker tools

Answer: b. Unusual system crashes

Explanation: Unusual system crashes may be a possible indicator and


should be carefully investigated, but they do not rise to the level of a definite
indicator.

Reacting to Incidents 💥

Once an actual incident is confirmed and properly classified, the incident


response (IR) plan moves from the detection phase to the reaction phase.
The steps in IR are designed to stop the incident, mitigate its effects, and
provide information for recovery. In this phase, actions taken by the
Computer Security Incident Response Team (CSIRT) and others must occur
quickly and may happen concurrently.

Notification of Key Personnel 🚨

As soon as an incident is declared, the right people must be notified


immediately and in the right order.

 An alert roster is a document containing contact information for


individuals to be notified in the event of an incident, either sequentially
or hierarchically.

 The alert message is a scripted description of the incident.

 Other key personnel are notified only after the incident is confirmed
but before external sources learn of it.

Documenting an Incident 📝
As soon as an incident is confirmed and the notification process begins, the
team should start documenting it. The documentation should record the who,
what, when, where, why, and how of each action taken. This serves as a case
study to determine if the right actions were taken and if they were effective.
It can also prove the organization did everything possible to deter the spread
of the incident.

Incident Containment Strategies

The essential task of IR is to stop the incident and contain its scope or
impact. Incident containment strategies focus on:

 Stopping the incident

 Recovering control of affected systems

Typical containment strategies include:

 Disabling compromised user accounts

 Reconfiguring a firewall to block problem traffic

 Temporarily disabling the compromised process or service

 Taking down the conduit application or server

 Disconnecting the affected network or network segment

 Stopping all computers and network devices

Incident Escalation ⬆️

An incident may increase in scope or severity to the point that the IR plan
cannot adequately contain it. Each organization must determine, during the
business impact analysis, the point at which an incident becomes a disaster.
The organization must also document when to involve outside responders.

Recovering from Incidents 🔄

Once the incident is contained and system control regained, recovery can
begin.

 First, inform appropriate human resources.

 The CSIRT assesses the full extent of the damage to determine what
must be done to restore systems.
 Incident damage assessment: The immediate determination of the
scope of the breach of confidentiality, integrity, and availability of
information and information assets.

 Those who document the damage must be trained to collect and


preserve evidence.

The incident recovery process includes:

 Restoring data from backups as needed.

 Restoring services and processes.

 Continuously monitoring the system.

 Restoring the confidence of communities of interest. This involves


identifying vulnerabilities that allowed the incident to occur and
spread, resolving them, addressing safeguards that failed,
installing/replacing/upgrading them, and evaluating monitoring
capabilities.

Common Mistakes CSIRTs Make ❌

According to McAfee, CSIRTs commonly fail to:

 Appoint a clear chain of command.

 Establish a central operations center.

 Know their enemy.

 Develop a comprehensive IR plan with containment strategies.

 Record IR activities at all phases.

 Document events in a timeline.

 Distinguish incident containment from incident remediation.

 Secure and monitor networks and network devices.

 Establish and manage system and network logging.

 Establish and support effective antivirus and antimalware solutions.

NIST Recommendations for Incident Handling 💡

Acquire tools and resources. Prevent incidents from occurring. Identify


precursors and indicators through alerts. Establish mechanisms for outside
parties to report incidents. Require a baseline level of logging and auditing.
Profile networks and systems. Understand normal behaviors. Create a log
retention policy. Perform event correlation. Keep all host clocks synchronized.
Maintain and use a knowledge base. Start recording information as soon as
an incident is suspected. Safeguard incident data. Prioritize handling of
incidents. Include provisions for incident reporting in the organization's
incident response policy. Establish strategies and procedures for containing
incidents. Follow established procedures for evidence gathering and
handling. Capture volatile data as evidence. Obtain system snapshots. Hold
lessons-learned meetings after major incidents.

Organizational Philosophy on Incident and Disaster Handling ⚖️

When facing incidents and disasters stemming from intentional attacks,


organizations must choose one of two philosophies:

 Protect and forget (patch and proceed): Focuses on restoring


systems and operations quickly.

 Apprehend and prosecute (pursue and prosecute): Prioritizes


investigating the incident, identifying the perpetrator, and pursuing
legal action.

Digital Forensics 🧑‍💻

Digital forensics is used to determine what happened and how an incident


occurred. It's based on traditional forensic principles and involves:

 Preservation

 Identification

 Extraction

 Documentation

 Interpretation of digital media for evidentiary and/or root-cause


analysis

Evidentiary material (EM): any item or information that applies to an


organization's legal or policy-based case.

Digital forensics serves two key purposes:

1. Investigating allegations of digital malfeasance

2. Performing root-cause analysis

Organizations typically choose one of two approaches:


1. Protect and forget: (patch and proceed)

2. Apprehend and prosecute: (pursue and prosecute)

The Digital Forensics Team ‍♀️

Most organizations can't maintain a permanent digital forensics team. They


usually collect data and outsource the analysis. Information security
personnel should be trained to understand and manage the forensics process
to avoid contaminating potential EM. Expertise can be gained through
training.

Digital Forensics Methodology 🔎

All investigations follow this basic methodology:

1. Identify relevant EM.

2. Acquire (seize) the evidence without alteration or damage.

3. Ensure the evidence is verifiably authentic and unchanged from the


time it was seized.

4. Analyze the data without risking modification or unauthorized access.

5. Report the findings to the proper authority.

Evidentiary Procedures 📜

Strong procedures for handling potential evidentiary material minimize the


probability of losing a legal challenge. Organizations should develop specific
procedures and guidance, supported by a procedures manual.

Disaster Recovery (DR) 💥

Disaster recovery planning (DRP): Preparation for and recovery from a


disaster (natural or human-made). An incident becomes a disaster when:

The organization can't contain or control the impact, or the damage is so


severe that quick recovery is impossible.

The key role of a DR plan is defining how to reestablish operations at the


primary site.

The Continuity Planning (CP) team creates the Disaster Recovery


Planning Team (DRPT). The DRPT organizes and prepares Disaster
Recovery Response Teams (DRRTs) to implement the DR plan. These
teams have multiple responsibilities:
 Recover salvageable information assets from the primary facility.

 Acquire replacement information assets.

 Reestablish functional information assets at the primary site (or a new


one, if necessary).

Some common DRRTs include:

 DR management

 Data management

 Communications

 Vendor contact

 Computer recovery

 Damage assessment and salvage (hardware)

 Business interface

 Systems recovery (OS)

 Network recovery

 Logistics

 Storage recovery

 Applications recovery

 Others as needed

Disaster Recovery Process 🔄

The NIST methodology, adapted for DRP, includes:

1. Organize the DR team.

2. Develop the DR planning policy statement.

3. Review the BIA (Business Impact Analysis).

4. Identify preventive controls.

5. Create DR strategies.

6. Develop the DR plan document.

7. Ensure DR plan testing, training, and exercises.


8. Ensure DR plan maintenance.

Disaster Recovery Policy 📄

The DR team, led by a designated manager, develops the DR policy. It


contains:

 Purpose

 Scope

 Roles and responsibilities

 Resource requirements

 Training requirements

 Exercise and testing schedules

 Plan maintenance schedule

 Special considerations

Disaster Classifications ⚠️

DR plans classify disasters in several ways:

 Natural disasters

 Human-made disasters

Disasters can also be classified by their rate of occurrence:

 Rapid-onset disasters

 Slow-onset disasters

Examples of Natural Disasters:

 Fire

 Flood

 Earthquake

 Lightning

 Landslide or mudslide

 Tornado or severe windstorm

 Hurricane or typhoon
 Tsunami

 Electrostatic discharge (ESD)

 Dust contamination

Planning to Recover 🚧

Scenario development and impact analysis categorize the threat level of


each potential disaster. When generating a DR scenario, start with the most
important asset: people.

Key points in the DR plan:

1. Clear delegation of roles and responsibilities

2. Execution of the alert roster and notification of key personnel

3. Clear establishment of priorities

4. Documentation of the disaster

5. Action steps to mitigate the impact

6. Alternative implementations for the various systems components

Simple DR Plan Elements 📝

A simple DR plan includes:

 Name of agency

 Date of completion/update and most recent test

 Agency staff to be called in a disaster

 Emergency services to be called (if needed)

 Locations of in-house emergency equipment and supplies

 Sources of off-site equipment and supplies

 Salvage priority list

 Agency disaster recovery procedures

 Follow-up assessment

Knowledge Check: When generating a disaster scenario for planning


or rehearsal, start with the most important asset: people.

Business Continuity (BC) Planning 🧑‍💼


Business Continuity (BC): Strategies that ensure critical business
functions continue during a disaster, allowing operations to resume even
after significant disruption. Managed by the CEO or COO.

Business Continuity Planning (BCP): The process of creating and


implementing BC strategies. Runs concurrently with DRP (Disaster Recovery
Plan).

BCP vs. DRP: While BCP focuses on re-establishing critical functions at


an alternate site, DRP centers on reestablishment at the primary site.

NIST Methodology for BC Planning

The NIST (National Institute of Standards and Technology) methodology


provides a structured approach to BCP:

1. Form the BC team.

2. Develop the BC planning policy statement.

3. Review the BIA (Business Impact Analysis).

4. Identify preventive controls.

5. Create relocation strategies.

6. Develop the BC plan.

7. Ensure BC plan testing, training, and exercises.

8. Ensure BC plan maintenance.

Business Continuity Policy Components 📄

A comprehensive BC policy should include:

 Purpose: The overall goal of the plan.

 Scope: What aspects of the business are covered.

 Roles and Responsibilities: Who is responsible for what.

 Resource Requirements: The resources needed (personnel,


technology, etc.).

 Training Requirements: Training needed for personnel.

 Exercise and Testing Schedules: Regular testing and drills.

 Plan Maintenance Schedule: Regular updates and revisions.


 Special Considerations: Any unique aspects of the organization.

Crisis Management 🚨

Crisis Management (CM): Focuses on the human impact of a disaster,


prioritizing the safety and well-being of personnel and the organization's
reputation. Often handled separately from DRP, sometimes as a subset.

Crisis Management Team Roles 🤝

According to Gartner Research, the crisis management team's


responsibilities include:

 Supporting personnel and their families during the crisis.

 Keeping the public informed.

 Communicating with stakeholders (customers, suppliers, partners,


agencies, media, etc.).

Crisis Management Planning Team (CMPT) Responsibilities

The CMPT establishes a command center and has three primary


responsibilities:

1. Verifying personnel status.

2. Activating the alert roster.

3. Coordinating with emergency services.

Initial Focus of Crisis Management

The initial priority in a crisis is the safety of staff, visitors, and the
public.

Business Resumption Planning (BRP) 🔄

Business Resumption Planning (BRP): Merges DR and BC planning into a


single, comprehensive plan. Supports re-establishment of operations at an
alternate site and eventually at the primary site.

Contingency Plan Testing 🧪

Testing is crucial to identify weaknesses and improve plans. Four testing


strategies are available:

 Desk check: Review of the plan by the team.

 Structured walk-through: A step-by-step review of the plan.


 Simulation: A simulated disaster scenario.

 Full interruption: A real-world test of the plan.

Continuous Process Improvement (CPI) 📈

Continuous Process Improvement (CPI): A formal methodology for


iteratively improving contingency plans. Each rehearsal provides
opportunities to identify areas for refinement and improvement.

Contingency Planning Process 🚧

The creation of contingency plan (CP) components uses a seven-step


process:

1. Develop the contingency planning policy statement.

2. Conduct the BIA (Business Impact Analysis).

3. Identify preventive controls.

4. Create contingency strategies.

5. Develop a contingency plan.

6. Ensure plan testing, training, and exercises.

7. Ensure plan maintenance.

Teams Involved in Contingency Planning 🧑‍💼

Four teams are involved:

 CP team: Creates the contingency plan.

 IR team: Incident Response team; ensures the CSIRT (Computer


Security Incident Response Team) is formed. The IR plan details
processes and procedures for planning, detecting, and resolving
unexpected event effects on information resources and assets. For
each scenario, they create procedures for before, during, and after the
incident to detect, contain, and resolve it. Incident classification
determines if a candidate constitutes an actual incident, using
possible, probable, and definite indicators.

 DR team: Disaster Recovery team.

 BC team: Business Continuity team.

Incident Classification and Digital Forensics 🔎


An actual incident is in progress when:

 Loss of availability of information

 Loss of integrity of information

 Loss of confidentiality of information

 Violation of policy

 Violation of law

Digital forensics: The investigation of wrongdoing in information security.


It involves preserving, identifying, extracting, documenting, and interpreting
computer media for evidence and root cause analysis.

Disaster Recovery and Business Continuity Planning 📁

 Disaster Recovery (DR) planning: Prepares for handling and


recovering from disasters (natural or human-made).

 Business Continuity (BC) planning: Ensures critical business


functions continue during catastrophic incidents or disasters. BC plans
may include:

 Hot sites

 Warm sites

 Cold sites

 Timeshares

 Service bureaus

 Mutual agreements

Business Resumption Planning 🤝

DR and BC plans are closely related; many organizations prepare both


simultaneously, combining them into a business resumption (BR) plan.
The DR plan should include crisis management (actions taken during and
after a disaster). Crisis management may have its own policy and plan if
protecting human life and the organization's image are high priorities. All
plans must be tested (vulnerabilities, faults, inefficiencies) using strategies
such as:

 Desk check
 Structured walk-through

 Simulation

 Full interruption

You might also like