Presentation is loading. Please wait.

Presentation is loading. Please wait.

Disaster Recovery & Business Continuity

Similar presentations


Presentation on theme: "Disaster Recovery & Business Continuity"— Presentation transcript:

1 Disaster Recovery & Business Continuity
Slides based on Whitman, M. and Mattord, H., Principles of Information Security; Thomson Course Technology 2003

2 Learning Objectives Upon completion of this lesson the student should be able to: Describe what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning. Discuss the elements that comprise a business impact analysis and the information that is collected for the attack profile. Recognize the components of an incident response plan. Learning Objectives: Upon completion of this material you should be able to: Know what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning. Understand the elements that comprise a business impact analysis and the information that is collected for the attack profile. Recognize the components of an incident response plan and the components of the planning process. Define the disaster recovery plan and its parts. Define the business continuity plan and its parts. Grasp the reasons for and against involving law enforcement officials in incident responses and when it is required.

3 Learning Objectives Upon completion of this lesson the student should be able to: Explain the steps involved in incident reaction and incident recovery. Define the disaster recovery plan and its parts. Define the business continuity plan and its parts. Discuss the reasons for and against involving law enforcement officials in incident responses and when may be required. Learning Objectives: Upon completion of this material you should be able to: Know what contingency planning is and how incident response planning, disaster recovery planning, and business continuity plans are related to contingency planning. Understand the elements that comprise a business impact analysis and the information that is collected for the attack profile. Recognize the components of an incident response plan and the components of the planning process. Define the disaster recovery plan and its parts. Define the business continuity plan and its parts. Grasp the reasons for and against involving law enforcement officials in incident responses and when it is required.

4 Introduction - So far we have:
Identified the following the problems facing the organization Assessed a value for the organization’s information assets Analyzed the threats in the organization’s environment Identified potential vulnerabilities Assessed the risks associated with current levels of the organization’s exposure Introduction So far we have: Identified the following the problems facing the organization Assessed a value for the organization’s information assets Analyzed the threats in the organization’s environment Identified potential vulnerabilities Assessed the risks associated with current levels of the organization’s exposure

5 Introduction - So far we have:
Prepared solid business reasons to support the risk strategy the organization should adopt for each information asset Begun to develop a security blueprint for future actions Outlined information security architecture or the necessary policies and technologies to guide the organization’s next steps. The next step is to examine the topic of contingency planning within the information security context Introduction So far we have: Prepared solid business reasons to support the risk strategy the organization should adopt for each information asset Begun to develop a security blueprint for future actions Outlined information security architecture or the necessary policies and technologies to guide the organization’s next steps. The next step is to examine the topic of contingency planning within the information security context.

6 blueprint for security
Contingency Planning Design: blueprint for security Chapter 6 FIGURE 7-1 Contingency Planning and the SecSDLC Contingency Planning and the SecSDLC

7 Continuity Strategy Managers must provide strategic planning to assure continuous information systems availability ready to use when an attack occurs Plans for events of this type are referred to in a number of ways: Business Continuity Plans (BCPs) Disaster Recovery Plans (DRPs) Incident Response Plans (IRPs) Contingency Plans Large organizations may have many types of plans, small organizations may have one simple plan, but most have inadequate planning Continuity Strategy Managers in the IT and information security communities are called on to provide strategic planning to assure the organization of continuous information systems availability. Each must be ready to act when a successful attack occurs. Plans for events of this type are referred to in a number of ways: Business Continuity Plans (BCPs), Disaster Recovery Plans (DRPs), Incident Response Plans (IRPs), or Contingency Plans. In large, complex organizations, each of these named plans may represent separate but related planning functions, differing in scope, applicability, and design. In a small organization, the security or systems administrator may have one simple plan, which consists of a straightforward set of media backup and recovery strategies, and a few service agreements from the company’s service providers. Many organizations have a level of planning that is woefully deficient.

8 Contingency Planning Contingency Planning (CP):
Incident Response Planning (IRP) Disaster Recovery Planning (DRP) Business Continuity Planning (BCP) The primary functions of these three planning types: IRP focuses on immediate response, but if the attack escalates or is disastrous the process changes to disaster recovery and BCP DRP typically focuses on restoring systems after disasters occur, and as such is closely associated with BCP BCP occurs concurrently with DRP when the damage is major or long term, requiring more than simple restoration of information and information resources We can classify Incident Response, Disaster Recovery, and Business Continuity planning, as components of Contingency Planning. Contingency Planning (CP) is the entire planning conducted by the organization to prepare for, react to and recover from events that threaten the security of information and information assets in the organization, and the subsequent restoration to normal modes of business operations. Incident Response Planning (IRP) is the planning process associated with the identification, classification, response, and recovery from an incident. Disaster Recovery Planning (DRP) is the planning process associated with the preparation for and recovery from a disaster, whether natural or man-made. Business Continuity Planning (BCP) is the planning process associated with ensuring that critical business functions continue if a catastrophic incident or disaster occurs. The primary functions of these three types of planning are: IRP focuses on immediate response, but if the attack escalates or is disastrous the process changes to disaster recovery and BCP. DRP typically focuses on restoring systems after disasters occur, and as such is closely associated with BCP. BCP occurs concurrently with DRP when the damage is major or long term, requiring more than simple restoration of information and information resources.

9 Continuity Strategy Primary functions of these three types of planning: IRP: immediate response If attack escalates or is disastrous, process changes to disaster recovery and BCP DRP: restoring systems after disasters occur Closely associated with BCP BCP: occurs concurrently with DRP when damage is major or long term For events requiring more than simple restoration of information and information resources The primary functions of these three types of planning are: IRP focuses on immediate response, but if the attack escalates or is disastrous the process changes to disaster recovery and BCP. DRP typically focuses on restoring systems after disasters occur, and as such is closely associated with BCP. BCP occurs concurrently with DRP when the damage is major or long term, requiring more than simple restoration of information and information resources

10 Contingency Planning Team
Before any planning can begin, a team has to plan the effort and prepare the resulting documents Champion - A high-level manager to support, promote, and endorse the findings of the project Contingency Planning Team Before any planning can begin, a team has to plan the effort and prepare the resulting documents Champion - A high-level manager to support, promote, and endorse the findings of the project Project Manager - Leads the project and makes sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed Team Members - Should be the managers or their representatives from the various communities of interest: Business, IT, and Information Security Before any planning can begin, a team has to plan the effort and prepare the resulting documents. Champion. A high-level manager to support, promote, and endorse the findings of the project. Project Manager. Leads the project and makes sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed. Team Members. Should be the managers or their representatives from the various communities of interest: business, IT, and infosec

11 Contingency Planning Team
Project Manager - Leads the project and makes sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed Team Members - Should be the managers or their representatives from the various communities of interest: Business, IT, and Information Security

12 Contingency Planning Hierarchy
Incident Response Disaster Recovery Business Continuity FIGURE 7-2 Contingency Planning Hierarchy

13 Contingency Planning Timeline
Incident Response (IRP) Disaster Recovery Planning (DRP) Business Continuity (BCP) Attack Post Attack (hours) Post Attack (days) FIGURE 7-3 Contingency Planning Timeline

14 Major Steps in Contingency Planning
Business impact analysis (BIA) Incident response planning Disaster recovery planning Business continuity planning Identification of threats and attacks Incident planning Plan for disaster recovery Establish Continuity strategy Business unit analysis Incident detection Crisis Management Plan for continuity of operations Scenarios of successful attacks Incident reaction Assessment of potential damages Recovery operations Continuity management Classification of subordinate plans Incident recovery FIGURE 7-4 Major Steps in Contingency Planning

15 Business Impact Analysis
Begin with Business Impact Analysis (BIA) if the attack succeeds, what do we do then? The CP team conducts the BIA in the following stages: Threat attack identification Business unit analysis Attack success scenarios Potential damage assessment Subordinate plan classification Business Impact Analysis The first phase in the development of the CP process is the Business Impact Analysis or BIA. A BIA is an investigation and assessment of the impact that various attacks can have on the organization, and takes up where the Risk Assessment process leaves off. The BIA assumes that these controls have been bypassed, have failed, or are otherwise ineffective in stopping the attack, and that the attack was successful. The question asked at this point is, if the attack succeeds, what do we do then? The CP team conducts the BIA in the following stages: Threat Attack identification Business unit analysis Attack success scenarios Potential damage assessment Subordinate plan classification

16 Threat Attack Identification & Prioritization
Update threat list with latest developments and add the attack profile The attack profile is the detailed description of activities during an attack Must be developed for every serious threat the organization faces Used to determine the extent of damage that could result to a business unit if the attack were successful Threat Attack Identification and Prioritization Most organizations have already performed the tasks of identifying and prioritizing threats. All that is required now is to update the threat list with the latest developments and add one additional piece of information, the attack profile. An attack profile is a detailed description of the activities that occur during an attack, must be developed for every serious threat the organization faces and are used to determine the extent of damage that could result to a business unit if the attack were successful.

17 Table 7-1 – Attack Profile
Date of Analysis Attack name & description Threat & probable threat agent Known or possible vulnerabilities Likely precursor activities or indicators Likely attack activities or indicators of attack in progress Information assets or risk from this attack Damage or loss to information assets likely from this attack Other assets at risk from this attack Damage or loss to other assets likely from this attack TABLE 7-1 Attack Profile

18 Business Unit Analysis
Second major task within BIA is analysis and prioritization of business functions within the organization Identify functional areas of the organization and prioritize them as to which are most vital Focus on a prioritized list of various functions the organization performs Business Unit Analysis The second major task within the BIA is the analysis and prioritization of business functions within the organization. The intent of this task is to identify the functional areas of the organization and prioritize them to determine which are most vital to the continued operations of the organization. Efforts in function analysis focus on the result of a prioritized list of the various functions the organization performs.

19 Attack Success Scenario Development
Next create a series of scenarios depicting the impact a successful attack from each threat could have on each prioritized functional area with: details on the method of attack the indicators of attack the broad consequences Attack success scenarios details are added to the attack profile including: Best case Worst case Most likely alternate outcomes Attack Success Scenario Development Next the BIA team must create a series of scenarios depicting the impact a successful attack from each threat could have on each prioritized functional area with details on the method of attack, the indicators of attack, and the broad consequences. Then attack success scenarios with more detail are added to the attack profile, including alternate outcomes, describing a best, worst, and most likely case that could result from each type of attack on this particular business functional area.

20 Potential Damage Assessment
From attack success scenarios developed, the BIA planning team must estimate costs of the best, worst, and most likely cases Costs include actions of the response team This final result is referred to as an attack scenario end case Potential Damage Assessment From the attack success scenarios developed above, the BIA planning team must estimate the cost of the best, worst, and most likely cases. These costs include the actions of the response team(s) described in subsequent sections as they act to quickly and effectively recover from any incident or disaster, and can also management representatives from all of the organization’s communities of interest of the importance of the planning and recovery efforts. This final result is referred to as an attack scenario end case.

21 Subordinate Plan Classification
Once potential damage has been assessed, a subordinate plan must be developed or identified Subordinate plans will take into account the identification of, reaction to, and recovery from each attack scenario An attack scenario end case is categorized as disastrous or not The qualifying difference is whether or not an organization is able to take effective action during the event to combat the effect of the attack Subordinate Plan Classification Once the potential damage has been assessed, and each end case has been evaluated, a subordinate plan must be developed or identified from among existing plans already in place. These subordinate plans will take into account the identification of, reaction to, and recovery from each attack scenario. An attack scenario end case is categorized as disastrous or not. The qualifying difference is whether or not an organization is able to take effective action during the event to combat the effect of the attack.

22 Incident Response Planning
Incident response planning covers identification of, classification of, and response to an incident An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources Attacks are only classified as incidents if they have the following characteristics: Are directed against information assets Have a realistic chance of success Could threaten the confidentiality, integrity, or availability of information resources IR is more reactive than proactive, with the exception of the planning that must occur to prepare the IR teams to be ready to react to an incident Incident Response Planning Incident response planning covers the identification of, classification of, and response to an incident. The IRP is made up of activities that are to be performed when an incident has been identified. An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources. Attacks are only classified as incidents if they have the following characteristics: Are directed against information assets Have a realistic chance of success Could threaten the confidentiality, integrity, or availability of information resources. Incident response (IR) is the set of activities taken to plan for, detect, and correct the impact of an incident on information resources. IR is more reactive, than proactive, with the exception of the planning that must occur to prepare the IR teams to be ready to react to an incident. Planning for an incident requires a detailed understanding of the scenarios developed for the BIA.

23 Incident Planning Pre-defined responses enable the organization to react quickly and effectively to the detected incident Two assumptions for good IR: 1) The organization has an IR team 2) The organization can detect the incident IR team consists of individuals needed to handle systems as the incident takes place Incident Planning The pre-defined responses enable the organization to react quickly and effectively to the detected incident. This assumes two things: first, the organization has an IR team, and second, the organization can detect the incident. The IR team consists of those individuals who must be present to handle the systems and functional areas that can minimize the impact of an incident as it takes place. The designated IR teams act to verify the threat, determine the appropriate response, and coordinate the actions necessary to deal with the situation. The military process of planned team responses can be used in an incident response. The planners should develop a set of documents that guide the actions of each involved individual reacting to and recovering from the incident. These plans must be properly organized, and stored to be available when, where and in a format supportive of the incident response.

24 Incident Planning IR teams act to verify the threat, determine the appropriate response, and coordinate the actions necessary to deal with the situation Military process of planned team responses can be used in an incident response Planners must develop a set of documents guiding the actions of each involved individual reacting to and recovering from the incident Plans must be properly organized and stored Incident Planning The pre-defined responses enable the organization to react quickly and effectively to the detected incident. This assumes two things: first, the organization has an IR team, and second, the organization can detect the incident. The IR team consists of those individuals who must be present to handle the systems and functional areas that can minimize the impact of an incident as it takes place. The designated IR teams act to verify the threat, determine the appropriate response, and coordinate the actions necessary to deal with the situation. The military process of planned team responses can be used in an incident response. The planners should develop a set of documents that guide the actions of each involved individual reacting to and recovering from the incident. These plans must be properly organized, and stored to be available when, where and in a format supportive of the incident response.

25 Incident Response Plan
Format and Content Plan must be organized to support quick and easy access to required information Accomplished through a number of measures Simplest is to create a directory of possible incidents with tabbed sections for each incident When someone needs to respond to an incident, they simply open the binder, flip to the appropriate section, and follow the clearly outlined procedures for an assigned role Incident Response Plan Format and Content. The IR plan must be organized so that, the organization supports, rather than impedes quick and easy access to the information needed. This can be accomplished through a number of measures, the simplest of which is to create a directory of incidents, with tabbed sections for each possible incident. When an individual needs to respond to an incident, he or she simply opens the binder, flips to the appropriate section, and follows the clearly outlined procedures for an assigned role. Storage. The information in the IR plan should be protected as sensitive information. If attackers know how a company responds to a particular incident, it could improve their chances of success in the attack. On the other hand, the organization needs this information readily available, usually within reach of the information assets that must be manipulated during or immediately after the attack. The bottom line is that individuals responding to the incident should not have to search frantically for needed information, especially under stress. Testing. A plan untested is not a useful plan. The levels of testing strategies can vary: Checklist. Structured walk-through. Simulation. Parallel. Full-interruption.

26 Incident Response Plan
Storage Plan should be protected as sensitive information On the other hand, the organization needs this information readily available Testing An untested plan is not a useful plan. The levels of testing strategies can vary: Checklist Structured walk-through Simulation Parallel Full-interruption

27 Incident Detection The most common occurrence is a complaint about technology support, often delivered to the help desk Possible detections: intrusion detection systems, both host-based and network-based virus detection software systems administrators end users Only through careful training can the organization hope to quickly identify and classify an incident Once an attack is properly identified, the organization can respond Incident Detection Individuals sometimes bring an unusual occurrence to the attention of systems administrators, security administrators, or their bosses. The most common occurrence is a complaint about technology support, often delivered to the help desk. The mechanisms that could potentially detect an incident include intrusion detection systems, both host-based and network-based, virus detection software, systems administrators, and even the end user. Only by carefully training the user, the help desk, and all security personnel on the analysis and identification of attacks can the organization hope to quickly identify and classify an incident. Once an attack is properly identified, the organization can effectively execute the corresponding procedures from the IR plan. Incident classification is the process of examining a potential incident, or incident candidate, and determining whether or not the candidate constitutes an actual incident.

28 Incident Indicators Possible indicators of incidents:
Presence of unfamiliar files Unknown programs or processes Unusual consumption of computing resources Unusual system crashes Probable indicators of incidents: Activities at unexpected times Presence of new accounts Reported attacks Notification from IDS Definite indicators of incidents: Use of dormant accounts Changes to logs Presence of hacker tools Notifications by partner or peer Notification by hacker Predefined situations that signal an automatic incident: Loss of availability Loss of integrity Loss of confidentiality Violation of policy Violation of law Incident Indicators There are a number of occurrences that could signal the presence of an incident candidate. Possible indicators of incidents: 1) Presence of unfamiliar files. 2) Presence or execution of unknown programs or processes. 3) Unusual consumption of computing resources. 4) Unusual system crashes. Probable indicators of incidents: 1) Activities at unexpected times. 2) Presence of new accounts. 3) Reported attacks. 4) Notification from IDS. Definite indicators of incidents. 1) Use of dormant accounts. 2) Changes to logs. 3) Presence of hacker tools. 4) Notifications by partner or peer. 5) Notification by hacker. Predefined situations that signal an automatic incident: 1) Loss of availability. 2) Loss of integrity. 3) Loss of confidentiality. 4) Violation of policy. 5) Violation of law.

29 Incident or Disaster When Does an Incident Become a Disaster?
The organization is unable to mitigate the impact of an incident during the incident The level of damage or destruction is so severe the organization is unable to quickly recover It is up to the organization to decide which incidents are to be classified as disasters and thus receive the appropriate level of response Incident Indicators When Does an Incident Become a Disaster? 1) the organization is unable to mitigate the impact of an incident during the incident, 2) the level of damage or destruction is so severe the organization is unable to quickly recover. The difference may be subtle. It is up to the organization to decide which incidents are to be classified as disasters and thus receive the appropriate level of response.

30 Incident Reaction Incident reaction consists of actions that guide the organization to stop the incident, mitigate the impact of the incident, and provide information for the recovery from the incident In reacting to the incident a number of actions must occur quickly including: notification of key personnel assignment of tasks documentation of the incident Incident Reaction Incident reaction consists of actions outlined in the IRP that guide the organization in attempting to stop the incident, mitigate the impact of the incident, and provide information for the recovery from the incident. In reacting to the incident there are a number of actions that must occur quickly. These include notification of key personnel, assignment of tasks, and documentation of the incident.

31 Notification of Key Personnel
Most organizations maintain alert rosters for emergencies Alert roster contains contact information for individuals to be notified in an incident Two ways to activate an alert roster: A sequential roster is activated as a contact person calls each and every person on the roster [safer & better] A hierarchical roster is activated as the first person calls a few other people on the roster, who in turn call a few other people, and so on (commonly called a calling tree) [faster] The alert message is a scripted description of the incident, just enough information so that everyone knows what part of the IRP to implement Notification of Key Personnel Most organizations maintain alert rosters for emergencies. An alert roster contains contact information for the individuals to be notified in an incident. Two ways to activate an alert roster: A sequential roster is activated as a contact person calls each and every person on the roster. A hierarchical roster is activated as the first person calls a few other people on the roster, who in turn call a few other people, and so on. The alert message is a scripted description of the incident, just enough information so that everyone knows what part of the IRP to implement.

32 Incident Documentation
Documenting the event is important: First, ensure that the event is recorded for the organization’s records What happened How it happened What actions were take Record who, what, when, where, why, & how Second, be able to prove, should it ever be questioned, that the organization did everything possible to prevent the spread of the incident Finally, a good incident record can be used as a simulation in future training sessions Documenting an Incident Documenting the event is important. First, it is important to ensure that the event is recorded for the organization’s records, to know what happened, and how it happened, and what actions were taken. The documentation should record the who, what, when, where, why and how of the event. Second, it is important to prove, should it ever be questioned, that the organization did everything possible to prevent the spread of the incident. The recorded incident can also be used as a simulation in future training sessions.

33 Incident Containment Strategies
Before an incident can be contained, the affected areas of the information and information systems must be determined The organization can stop the incident and attempt to recover control through a number of strategies including: severing the affected circuits disabling accounts reconfiguring a firewall ultimate containment option (reserved for only the most drastic of scenarios) involves a full stop of all computers and network devices in the organization Incident Containment Strategies One of the most critical components of incident reaction is to stop the incident or contain its scope or impact. However, sometimes situations prevent the most direct measures associated with simply “cutting the wire.” Before an incident can be contained, the affected areas of the information and information systems must be determined. In general, incident containment strategies focus on two tasks: stopping the incident and recovering control of the systems. The organization can stop the incident and attempt to recover control through a number of strategies. If the Incident: originates outside the organization, the simplest and most straightforward approach is to sever the affected circuits. is using compromised accounts, the accounts can be disabled. is coming in through a firewall, the firewall can be reconfigured to block that particular traffic. is using a particular service or process, that process or service can be disabled temporarily. is using the organization’s systems to propagate itself, you can take down that particular application or server. The ultimate containment option, reserved for only the most drastic of scenarios, involves a full stop of all computers and network devices in the organization. The bottom line is that containment consists of isolating the channels, processes, services, or computers and removing the losses from that source of the incident.

34 Incident Recovery Once the incident has been contained, and control of the systems regained, the next stage is recovery First task: identify human resources needed and launch them into action Full extent of damage must be assessed The organization repairs vulnerabilities, addresses any shortcomings in safeguards, and restores data and services of the systems INCIDENT RECOVERY Once the incident has been contained, and control of the systems regained, the next stage is recovery. As with reaction to the incident, the first task is to identify the human resources needed for the recovery and launch them into action. The full extent of the damage must be assessed. The process of computer forensics entails determining how the incident occurred and what happened. The organization repairs vulnerabilities, addresses any shortcomings in safeguards, and restores the data and services of the systems.

35 Damage Assessment Incident damage assessment is immediate determination of the scope of the breach of CIA of information and assets after an incident Sources of information include: system logs intrusion detection logs configuration logs and documents documentation from the incident response results of a detailed assessment of systems and data storage Damage Assessment Incident damage assessment is the immediate determination of the scope of the breach of CIA of information and assets after an incident. There are several sources of information on the type, scope, and extent of damage, including system logs, intrusion detection logs, configuration logs and documents, the documentation from the incident response, and the results of a detailed assessment of systems and data storage. Based on this information, the IR team must begin to examine the current state of the information and systems and compare them to a known state. Related to the task of incident damage assessment is the field of computer forensics. Computer forensics is the process of collecting, analyzing, and preserving computer-related evidence. Evidence proves an action or intent. Computer evidence must be carefully collected, documented, and maintained to be acceptable in formal or informal proceedings. Circumstances requires that individuals who look for the damage receive special training, should it be determined that the incident is part of a crime or may result in a civil action.

36 Computer Forensics Related to incident damage assessment is the field of computer forensics This is the process of collecting, analyzing, and preserving computer-related evidence Evidence may prove action or intent Computer evidence must be carefully collected, documented, and maintained to be acceptable in formal proceedings Individuals assessing damage need special training Related to the task of incident damage assessment is the field of computer forensics. Computer forensics is the process of collecting, analyzing, and preserving computer-related evidence. Evidence proves an action or intent. Computer evidence must be carefully collected, documented, and maintained to be acceptable in formal or informal proceedings. Circumstances requires that individuals who look for the damage receive special training, should it be determined that the incident is part of a crime or may result in a civil action.

37 Recovery In the recovery process:
Identify vulnerabilities that allowed the incident to occur and spread and resolve them Address safeguards that failed to stop or limit the incident, or were missing from the system in the first place Install, replace or upgrade them Evaluate monitoring capabilities Improve their detection and reporting methods, or simply install new monitoring capabilities Restore data from backups Restore services and processes in use Continuously monitor the system Restore confidence of the members of the organization’s communities of interest Conduct an after-action review Recovery The recovery process involves: Identify the vulnerabilities that allowed the incident to occur and spread and resolve them. Address the safeguards that failed to stop or limit the incident, or were missing from the system in the first place. Install, replace or upgrade them. Evaluate monitoring capabilities. Improve their detection and reporting methods, or simply install new monitoring capabilities. Restore the data from backups. Restore the services and processes in use. Continuously monitor the system. Restore the confidence of the members of the organization’s communities of interest. Conduct an after-action review.

38 Automated Response New systems can respond to incidents autonomously
Trap and trace uses a combination of resources to detect intrusion then trace back to source Trapping may involve honeypots or honeynets Enticement is the process of attracting attention to a system by placing tantalizing bits of information in key locations Entrapment is luring an individual into committing a crime to get a conviction Enticement is legal and ethical, while entrapment is not Automated Response While traditional systems were configured to detect incidences, and then notify the human administrator, new systems can respond to the incident threat autonomously. These systems, referred to as trap and trace, use a combination of resources to detect an intrusion, and then to trace incidents back to their sources. Unfortunately, some less scrupulous administrators might even be tempted to back hack or hack into a hacker’s system to find out as much as possible about the hacker. The problem is that the hacker may actually move into and out of a number of organizations’ systems and by tracking the hacker, administrators may wander through other organizations’ systems. The trap portion frequently involves the use of honeypots or honeynets. Honeypots are computer servers configured to resemble production systems. If a hacker stumbles into the system, alarms are set off, and the administrator notified. Honeynets, consist of networks or subnets of systems that operate similarly. Enticement is the process of attracting attention to a system by placing tantalizing bits of information in key locations. Entrapment is the action of luring an individual into committing a crime to get a conviction. Enticement is legal and ethical, while entrapment is not.

39 Disaster Recovery Planning
Disaster recovery planning (DRP) is planning the preparation for and recovery from a disaster The contingency planning team must decide which actions constitute disasters and which constitute incidents When situations are classified as disasters plans change as to how to respond may occur - take action to secure the most valuable assets to preserve value for the longer term even at the risk of more disruption DRP strives to reestablish operations at the ‘primary’ site Disaster Recovery Planning Disaster recovery planning (DRP) is planning the preparation for and recovery from a disaster, whether natural or manmade. The contingency planning team must decide which actions constitute disasters and which constitute incidents. At the time that a decision is made and the situations is classified as a disaster, the organization may change how it is responding and take action to secure its most valuable assets to preserve value for the longer term even at the risk of more disruption in the immediate term. Again, the key emphasis of a DRP is to reestablish operations at the ‘primary’ site, the location at which the organization performs its business. The goal is to make things ‘whole’ or ‘as they were’ before the disaster. Again, the key emphasis of a DRP is to reestablish operations at the ‘primary’ site, the location at which the organization performs its business. The goal is to make things ‘whole’ or ‘as they were’ before the disaster.

40 DRP Steps Clearly establish priorities
Clearly delegate roles and responsibilities Initiate the alert roster and notify key personnel Task someone with documentation of the disaster If (and only if) it is possible, make some attempts to mitigate impact of the disaster on the operations of the organization DISASTER RECOVERY PLANNING Steps 1) There must be a clear establishment of priorities. 2) There must be a clear delegation of roles and responsibilities. 3) Someone must initiate the alert roster and notify key personnel. 4) Someone must be tasked with the documentation of the disaster. 5) If and only if it is possible, some attempts must be made to mitigate the impact of the disaster on the operations of the organization.

41 Crisis Management Crisis management is actions taken during and after a disaster focusing on the people involved and addressing the viability of the business The crisis management team is responsible for managing the event from an enterprise perspective and covers: Supporting personnel and families during the crisis Determining impact on normal business operations and, if necessary, making a disaster declaration Keeping the public informed Communicating with major customers, suppliers, partners, regulatory agencies, industry organizations, the media, and other interested parties Crisis Management Crisis management includes the actions taken during and after a disaster, and focuses first and foremost on the people involved and addresses the viability of the business. The crisis management team is responsible for managing the event from an enterprise perspective and covers: Supporting personnel and their loved ones during the crisis Determining the event's impact on normal business operations and, if necessary, making a disaster declaration Keeping the public informed about the event and the actions being taken to ensure the recovery of personnel and the enterprise Communicating with major customers, suppliers, partners, regulatory agencies, industry organizations, the media, and other interested parties.

42 Disaster Recovery Planning
Establish a command center to support communications Include individuals from all functional areas of the organization to facilitate communications and cooperation Some key areas of crisis management include: Verifying personnel head count Checking the alert roster Checking emergency information cards Disaster Recovery Planning The crisis management team should establish a base of operations or command center to support communications until the disaster has ended and includes individuals from all functional areas of the organization to facilitate communications and cooperation. Some key areas of crisis management include: 1) Verifying personnel head count. 2) Checking the alert roster. 3) Checking emergency information cards. Crisis management must balance the needs of the employees with the needs of the business in providing personnel with support for personal and family issues during disasters.

43 DRP Structure Similar to the IRP, DRP is organized by disaster, and provides procedures to execute during and after a disaster Provides details on the roles and responsibilities for those involved in the effort, and identifies the personnel and agencies that must be notified Just as the IRP must be tested, so must the DRP, using the same testing mechanisms Each organization must examine its scenarios, developed during the initial contingency planning, to determine how to respond to the various disasters DRP Structure Similar in structure to the IRP, the DRP is organized by disaster, and provides procedures to execute during and after a disaster. It also provides details on the roles and responsibilities of the various individuals involved in the disaster recovery effort, and identifies the personnel and agencies that must be notified. Just as the IRP must be tested, so must the DRP, using the same testing mechanisms. Reaction to a disaster can vary so widely, that it is impossible to describe the process with any accuracy. As a result it is up to each organization to examine its scenarios, developed during the initial contingency planning, to determine how to respond to the various disasters. Should the physical facilities be spared after the disaster, the disaster recovery team should begin the restoration of systems and of data to work toward full operational capability. If the organization’s facilities do not survive, alternative actions must be taken until new facilities can be acquired.

44 Business Continuity Planning
Business continuity planning outlines reestablishment of critical business operations during a disaster that impacts operations If a disaster has rendered the business unusable for continued operations, there must be a plan to allow the business to continue to function Business Continuity Planning Business continuity planning outlines reestablishment of critical business operations during a disaster that impacts operations at the primary site. If a disaster has rendered the current location of the business unusable for continued operations, there must be a plan to allow the business to continue to function.

45 Developing Continuity Programs (BCPs)
A business continuity program, as documented in the BCP, is a function of contingency planning Once incident response plans and disaster recovery plans are in place, the organization needs to address the possibility of finding temporary facilities to support the continued viability of the business BCP consists primarily of selecting a continuity strategy and integrating off-site data storage and recovery functions The business continuity program, as documented in the BCP, is a function of the contingency planning process. Once the incident response plans and disaster recovery plans are in place, the organization needs to address the possibility of finding temporary facilities to support the continued viability of the business. The BCP consists primarily of selecting a continuity strategy and integrating the off-site data storage and recovery functions into this strategy.

46 Developing Continuity Programs (BCPs)
First part of the BCP is performed when joint DRP/BCP plan is developed Cornerstone of BCP is identification of critical business functions & resources needed to support them Contingency planning team needs to appoint a team to evaluate/compare various alternatives available and recommend which strategy should be selected and implemented Strategy selected usually involves an off-site facility, which should be inspected, configured, secured and tested on a periodic basis The first part of the BCP is performed when the joint DRP/BCP plan is developed. The cornerstone of BCP is the identification of critical business functions and the resources needed to support them. The contingency planning team needs to appoint a team to evaluate and compare the various alternatives available, and recommend which strategy should be selected and implemented. The strategy selected usually involves some form of off-site facility, which should be inspected, configured, secured and tested on a periodic basis

47 Continuity Strategies
There are a number of strategies for planning for business continuity Determining factor in selection between these options is usually cost In general, three exclusive options exist: hot sites warm sites cold sites And three shared functions: timeshare service bureaus mutual agreements Continuity Strategies There are a number of strategies that an organization can choose from when planning for business continuity. The determining factor in selection between these options is usually cost. In general there are three exclusive options: hot sites, warm sites, and cold sites, and three shared functions: timeshare, service bureaus, and mutual agreements.

48 Off-Site Disaster Data Storage
To get these types of sites up and running quickly, the organization must have the ability to port data into the new site’s systems These include: Electronic vaulting - bulk batch-transfer of data to an off-site facility Remote Journaling - transfer of live transactions to an off-site facility; only transactions are transferred not archived data; transfer is real-time Database shadowing - Not only processing duplicate real-time data storage, but also duplicates databases at the remote site to multiple servers Off-Site Disaster Data Storage To get these types of sites up and running quickly, the organization must have the ability to port data into the new site’s systems. There are a number of options for getting operations up and running quickly, and some of these options can be used for purposes other than restoration of continuity. These include: Electronic vaulting - The bulk batch-transfer of data to an off-site facility. Remote Journaling - The transfer of live transactions to an off-site facility; only transactions are transferred not archived data, and the transfer is real-time. Database shadowing - not only processing duplicate real-time data storage, but also duplicates the databases at the remote site to multiple servers.

49 Model for IR/DR/BC Plan
The single document set approach supports concise planning and encourages smaller organizations to develop, test, and use IR/DR plans The model presented is based on analyses of disaster recovery and incident response plans of dozens of organizations Model For IR/DR/BC Plan The single document set approach supports concise planning and encourages smaller organizations to develop, test, and use IR/DR plans. The model presented is based on analyses of disaster recovery and incident response plans of dozens of organizations.

50 The Planning Document Establish responsibility for managing the document, typically the security administrator Appoint a secretary to document the activities and results of the planning session(s) Independent incident response and disaster recovery teams are formed, with a common planning committee Outline the roles and responsibilities for each team member Develop the alert roster and lists of critical agencies Identify and prioritize threats to the organization’s information and information systems The Planning Document Establish the responsibility for managing the document, typically the security administrator. Appoint a secretary to document the activities and results of the planning session. Independent incident response and disaster recovery teams are formed, sharing a common planning committee. Outline the roles and responsibilities for each team member. Develop the alert roster is developed, and lists of critical agencies. Identify and prioritize threats to the organization’s information and information systems.

51 The Planning Process Six steps of the Contingency Planning process:
Identify mission- or business-critical functions Identify resources that support critical functions Anticipate potential contingencies or disasters Select contingency planning strategies Implement contingency strategies Test and revise the strategy The Planning Process There are six steps in the Contingency planning process . 1. Identifying the mission- or business-critical functions. 2. Identifying the resources that support the critical functions. 3. Anticipating potential contingencies or disasters. 4. Selecting contingency planning strategies. 5. Implementing the contingency strategies. 6. Testing and revising the strategy. The Planning Document 1. During the incident. Develop and document the procedures that must be performed during the incident. Group procedures and assign to individuals. Each member of the planning committee begins to draft a set of function-specific procedures. 2. After the incident. Develop the procedures that must be performed immediately after the incident has ceased. Again, separate functional areas may develop different procedures. 3. Before the incident. Draft those tasks that must be performed to prepare for the incident. These are the details of the data backup schedules, the disaster recovery preparation, training schedules, testing plans, copies of service agreements, and business continuity plans if any. Finally the IR portion of the plan is assembled. Sections detailing the organization’s DRP and BCP efforts are placed after the incident response sections. Critical information as outlined in these planning sections are recorded, including information on alternate sites, etc. as indicated in the “before the incident” section, applicable to the disaster recovery and business continuity efforts. Multiple copies for each functional area are created, cataloged, and signed out to responsible individuals.

52 Using the Plan During the incident After the incident
Develop and document procedures that must be performed during the incident Group procedures and assign to individuals Each member of the planning committee begins to draft a set of function-specific procedures After the incident Develop procedures that must be performed immediately after the incident has ceased Again, separate functional areas may develop different procedures Using the Plan During the incident Develop and document the procedures that must be performed during the incident Group procedures and assign to individuals Each member of the planning committee begins to draft a set of function-specific procedures After the incident Develop the procedures that must be performed immediately after the incident has ceased Again, separate functional areas may develop different procedures

53 Using the Plan Before the incident
Draft tasks that must be performed to prepare for the incident These are details of: Data backup schedules Disaster recovery preparation Training schedules Testing plans Copies of service agreements Business continuity plans if any. 3. Before the incident. Draft those tasks that must be performed to prepare for the incident. These are the details of the data backup schedules, the disaster recovery preparation, training schedules, testing plans, copies of service agreements, and business continuity plans if any. Finally the IR portion of the plan is assembled. Sections detailing the organization’s DRP and BCP efforts are placed after the incident response sections. Critical information as outlined in these planning sections are recorded, including information on alternate sites, etc. as indicated in the “before the incident” section, applicable to the disaster recovery and business continuity efforts. Multiple copies for each functional area are created, cataloged, and signed out to responsible individuals.

54 The Planning Document Finally assemble the IR portion of the plan
Sections detailing the organization’s DRP and BCP efforts are placed after the incident response sections Critical information as outlined in these planning sections are recorded, including information on alternate sites, etc. as indicated in the “before the incident” section, applicable to the disaster recovery and business continuity efforts Multiple copies for each functional area are created, cataloged, and signed out to responsible individuals Finally the IR portion of the plan is assembled. Sections detailing the organization’s DRP and BCP efforts are placed after the incident response sections. Critical information as outlined in these planning sections are recorded, including information on alternate sites, etc. as indicated in the “before the incident” section, applicable to the disaster recovery and business continuity efforts. Multiple copies for each functional area are created, cataloged, and signed out to responsible individuals.

55 Contingency Plan

56 Law Enforcement Involvement
When the incident at hand constitutes a violation of law the organization may determine that involving law enforcement is necessary There are several questions which must then be answered: When should the organization get law enforcement involved? What level of law enforcement agency should be involved: local, state, or federal? What will happen when the law enforcement agency is involved? Some of these questions are best answered by the organization’s legal department Law Enforcement Involvement There may come a time, when it has been determined that the incident at hand exceeds the violation of policy and constitutes a violation of law. The organization may determine that involving law enforcement is necessary. There are several questions, which must then be answered. When should the organization get law enforcement involved? What level of law enforcement agency should be involved: local, state or federal? What will happen when the law enforcement agency is involved? Some of these questions are best answered by the organization’s legal department.

57 Local, State, or Federal Authorities
Selecting the level of law enforcement depends on the level and type of crime discovered: The Federal Bureau of Investigation deals with many computer crimes that are categorized as felonies The US Secret Service works with crimes involving US currency, counterfeiting, credit cards, identity theft, and other crimes The US Treasury Department has a bank fraud investigation unit and the Securities and Exchange Commission has investigation and fraud control units as well Local, State, or Federal Authorities Selecting the level of law enforcement to involve depends in part on the level and type of crime discovered. The Federal Bureau of Investigation deals with many computer crimes that are categorized as felonies. The US Secret Service works with crimes involving US currency, counterfeiting, credit cards, identity theft and other crimes. The US Treasure Department has a bank fraud investigation unit and the Securities and Exchange Commission has investigation and fraud control units as well. However, due to the heavy load of cases these agencies must handle, they typically give preference to those incidents that address the national critical infrastructure or that have significant economic impact.

58 State Investigative Services
Each state has its own version of the FBI (except Illinois! – interesting story why not) These state agencies arrest individuals, serve warrants, and generally enforce laws on property that is owned by the state or any state agency In Illinois, computer crime is the responsibility of the State of Illinois High Tech Crime Bureau, part of the Attorney General’s Office State Investigative Services Each state has its own version of the FBI (except Illinois! – interesting story why not) These state agencies arrest individuals, serves warrants, and generally enforce laws on property that is owned by the state or any state agency In Illinois, computer crime is the responsibility of the State of Illinois High Tech Crime Bureau, part of the Attorney General’s Office Local Law Enforcement Local agencies enforce all local and state laws and handle suspects and security crime scenes for state and federal cases. Local law enforcement agency seldom have a computer crimes task force, but the investigative (detective) units are quite capable of processing crime scenes, and handling most common criminal activities, such as physical theft or trespassing, damage to property, and the apprehension and processing of suspects of computer related crimes.

59 Local Law Enforcement Local agencies enforce all local and state laws and handle suspects and security crime scenes for state and federal cases Local law enforcement agencies seldom have a computer crimes task force, but most investigative (detective) units are capable of processing crime scenes, and handling most common criminal activities and the apprehension and processing of suspects of computer related crimes Local Law Enforcement Local agencies enforce all local and state laws and handle suspects and security crime scenes for state and federal cases. Local law enforcement agency seldom have a computer crimes task force, but the investigative (detective) units are quite capable of processing crime scenes, and handling most common criminal activities, such as physical theft or trespassing, damage to property, and the apprehension and processing of suspects of computer related crimes.

60 Benefits of Law Enforcement Involvement
Involving law enforcement agencies has advantages: Agencies may be much better equipped at processing evidence than private organizations Unless the organization has staff trained in forensics they may less effective in convicting suspects Law enforcement agencies are also prepared to handle the warrants and subpoenas needed Law enforcement skilled at obtaining statements from witnesses, completing affidavits, and other information collection Benefits of Law Enforcement Involvement Involving law enforcement agencies has both advantages and disadvantages. The agencies may be much better equipped at processing evidence than a particular organization. Unless the security forces in the organization have been trained in processing evidence and computer forensics, they may do more harm than good in extracting the necessary information to legally convict a suspected criminal. Law enforcement agencies are also prepared to handle the warrants and subpoenas necessary to documenting a case. They are also adept at obtaining statements from witnesses, affidavits, and other required documents. Law enforcement personnel can be a security administrator’s greatest ally in the war on computer crime. It is therefore important to get to know your local and state counterparts, before you have to make a call announcing a suspected crime.

61 Drawbacks to Law Enforcement Involvement
Involving law enforcement agencies has disadvantages: On the downside, once a law enforcement agency takes over a case, the organization loses complete control over the chain of events The organization may not hear about the case for weeks or even months Equipment vital to the organization’s business may be tagged as evidence, to be removed, stored, and preserved until it can be examined for possible support for the criminal case However, if the organization detects a criminal act, it is a legal obligation to involve the appropriate law enforcement officials Drawbacks to Law Enforcement Involvement Involving law enforcement agencies has both advantages and disadvantages. On the downside, once a law enforcement agency takes over a case, the organization loses complete control over the chain of events, the collection of information and evidence, and the prosecution of suspects. An individual the organization may wish only to censure and dismiss may face criminal charges whereby the intricate details of their crimes become matters of public record. The organization may not hear about the case for weeks or even months. Equipment vital to the organization’s business may be tagged evidence, to be removed, stored, and preserved until it can be examined for possible support for the criminal case. However, if the organization detects a criminal act, it is a legal obligation to involve the appropriate law enforcement officials.

62 The End… Questions? Discussion!


Download ppt "Disaster Recovery & Business Continuity"

Similar presentations


Ads by Google