Contigency Planning
Contigency Planning
A contingency plan is the way that your team should react if there is something that
interrupts the normal course of business.
Main goal: restoration to normal modes of operation with minimum cost &
disruption to normal business activities after an unexpected event
• Contingency Planning vs. Risk Management
• Contingency planning and risk management are closely related but different
processes.
• Contingency planning addresses the “what if” situations and develops a plan
that will work around those situations. Risk management is a proactive
approach that companies use to prevent loss or disasters.
• So rather than being reactive like a contingency plan, a risk management plan
looks to stop adverse events from happening in the first place.
CP Components
CP team
Training schedules
Testing plans
Incident classification:
process of examining a possible incident & determining
whether or not it constitutes actual incident
Initial reports from ...
end users,
intrusion detection systems (IDS),
host- & network-based anti-virus software, Sysadmins
(Example: RSA Data Loss Prevention)
• The group is demanding a ransom of $50,000 to be paid in Bitcoin, in the next 72 hours or data will be
posted online
• The encrypted and exfiltrated files consists of personal documents, including staff contracts, medical
information, payroll information and records of internal grievances
Question 2
• Who should be part of the incident response team during a
ransomware incident?
• The IT dept only
• A cross-functional team including legal , IT HR and senior
management. This may also include any relevant or appropriate
external parties
• External cybersecurity consultants exclusively
• Only individuals from the affected dept ie HR
Detection and analysis
• It has been decided that the organization will not pay the ransom
• A virtual war room is established to allow CIRT to discuss and share the information.
The war room is restricted to only member of CIRT. All actions are documented.
• An initial assessment is conducted to identify any possible risks or issues that might
arise during the organization’s response
• The incident is classified as High
• A report is made to the National Cyber security center to inform them
• A forensically sound image of the server is required and sent to a trusted 3rd party to
conduct a digital forensic assessment to determine how the threat actors managed
to gain access to the HR server. The objectives are identified and agreed by the CIRT
Detection and analysis
• The digital forensics assessment confirms that:
• On the HR Server the threat actors managed to exploit a known vulnerability, escalate
their privileges, and then taken a copy of username and passwords stored on the
server.
• The threat actors also managed to create their own accounts on the server to maintain
persistence until their objective was complete
• The data was exfiltrated on to a known cloud storage platform prior to deploying the
ransomware
• The threat actor had managed move laterally from a device used by a member of the
HR department. The threat actors used the RDP. This device was then subsequently
isolated, and an image was taken to be analysed
• The threat actors had managed to social engineer a staff member using a phishing
email. As a result, the staff member provided the threat actor with the domain
credentials
• IoCs confirm that only two devices have been compromised
Containment
• All confirmed or suspected compromised credentials are changed
• Remote access/connections from any external sources are reviewed
as blocked if non-essential
• Segment critical systems from the compromised environment
• A request is made to the cloud provider to delete any of the
organization's data
• The integrity of the recent backups are reviewed to ensure that
haven’t been compromised
• A communication strategy is identified and agreed by the CIRT
If your organization was to face a similar incident , at what step
would/should your organization communicate with its staff
• Detection and analysis
• Containment
• Eradication
• Recovery
• Post Incident
Eradication and Recovery
• CIRT decide that HR server will be rebuilt (rather than replaced) by IT
using known good media/images
• HR is provided with a known clean device
Post Incident Review
• Having a well-rehearsed cyber incident response plan is crucial. This should
be a living document that is updated regularly.
• A post incident review is key following any real or tabletop exercise. It is
recommended this activity is held no later than 1-2 week after an incident as
details will soon be forgotten
• Post-incident review should answer the following question at minimum:-
• What happened and when
• What went well during the response effort
• What didn’t go well during the response effort
• What does the organization need to do differently to limit the risk of this happening again?
• What security measures could the organization put into place to minimize the risk
• The output of the post incident review should be fed back into the organization’s
approach to cyber security and incident response
Exercises
1.
• Alice is an information security manager. He had requested to
document detailed information about when an incident was occurred,
how bad it was, and how it was fixed as well as effectiveness of the
incident response and any gaps that needed to be fixed . Which
document is referred is
• A) Chain of evidence
• B) Chain of custody report
• C) Firewall analysis report
• D) lessons learned report
2.
• Alice noticed a strange pattern of traffic while looking at the proxy logs. Several
hosts on the inside were constantly talking to the external IP address over port
443. There was a report of an incident and a probe was started . After talking to
the affected clients, the analyst found that the activity began right after a new
patch installation . Based on this information, which of the following would be the
next step in the investigation
• A) Do a network scan to find any nefarious devices that might be causing the
traffic. Take those things off the network
• B) Find out what the destination IP is and who owns it and look at the processes
running on the affected hosts to see if the activity is malicious
• C) Install antivirus and validate control with effectiveness
• D)Ask the desktop support staff to bit by bit image of all of the affected
computers and reinstall the patch design soft
3.
• Alice’s team received an incident ticket from the Operation Team
regarding one system is infected with a major virus. What will be the
first step of the team to handle this situation
• A) Finding root cause of the incident
• B) Report to the senior management
• C) Confirm and validate all details associated with the tickets
• D) Disconnect the impacted system from the production
4.
• Organization has reacted to a security incident. The breach has been
mitigated, and all systems have been recovered according to SLA and
contract. What is the best action plan we can take to make sure a
similar incident does not happen in our organization
• A) Conduct a root cause analysis of the incident
• B) Inform the management of the business case
• C) Document the entire incident and share with the other department
• D) validate the results and reduce the impact
5.
• In which stage of IRP, team will immediately isolate and contain an
incident or otherwise disabling complex systems or components like
user account, server, or workstations
• A) Mitigation
• B) reporting
• C) Remediation
• D) Lesson learned
6.
• ABC Limited operates a major consulting service in Europe. They need to
comply with GDPR requirements. One day, company was hit with a
significant data breach and an incident response team, according to the
incident report, was working on the situation. An organization must
promptly report the breach details to customers and regulatory
authorities within 72 hours. In which stage of the incident Response
process, we must do reporting
• A) after confirming the incident and reducing the temporary impact,
report the breach
• B) after the successful restoration of the system, report the breach
• C)After the post-incident report, documenting the breach
• D) after the user reports an incident to the help desk, then notifying the
customer
7.
• At which stage of the incident response process does the team
confirm the incident and identify the criticality and categorization of
the incident
• Response
• Detect
• Recovery
• Reporting
• Incident management team
• Problem management team