Principles of Incident Response and Disaster Recovery

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

A Brief Overview of Emergency Management Office of Emergency Management April 2006 Prepared By: The Spartanburg County Office of Emergency Management.
Systems Availability and Business Continuity Chapter Four Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Capability Cliff Notes Series PHEP Capability 5—Fatality Management What Is It And How Will We Measure It?
Service Design – Section 4.5 Service Continuity Management.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Principles of Incident Response and Disaster Recovery
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Planning for Contingencies
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Network security policy: best practices
Crisis Management Planning Employee Health Safety and Security Expertise Panel · Presenter Name · 2008.
Introduction to Network Defense
1 Business Continuity. 2 Continuity strategy Business impact Incident response Disaster recovery Business continuity.
Planning for Continuity
SEC835 Database and Web application security Information Security Architecture.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Information Systems Security Computer System Life Cycle Security.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Rich Archer Partner, Risk Advisory Services KPMG LLP Auditing Business Continuity Plans.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Centro de Estudos e Sistemas Avançados do Recife PMBOK - Chapter 4 Project Integration Management.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Information Systems Security Operational Control for Information Security.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
I MPLEMENTING IT S ECURITY FOR S MALL AND M EDIUM E NTERPRISES Short Presentation by Subhash Uppalapati. - Edgar R. Weippl and Markus Klemen.
Developing Plans and Procedures
Principles of Incident Response and Disaster Recovery, 2nd Edition
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
INFORMATION SECURITY MANAGEMENT L ECTURE 3: P LANNING FOR C ONTINGENCIES You got to be careful if you don’t know where you’re going, because you might.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
NFPA 1600 Disaster/Emergency Management and Business Continuity Programs.
SecSDLC Chapter 2.
Chapter 12 Implementation and Maintenance
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
© 2003 ISACA Chapter 5 ResponseManagement 2003 CISM™ Review Course.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Business Continuity Disaster Planning
CBIZ RISK & ADVISORY SERVICES BUSINESS CONTINUITY PLANNING Developing a Readiness Strategy that Mitigates Risk and is Actionable and Easy to Implement.
Information Security Office: Function, Alignment in the Organization, Goals, and Objectives Presentation to Sacramento PMO March 2011 Kevin Dickey.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
MANAGING INCIDENT RESPONSE By: Ben Holmquist. 2 Outline Key Terms and Understanding Personnel and Plan Preparation Incident Detection Incident Response.
Disaster Recovery Management By: Chris Rozic COSC 481.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Business Continuity Planning 101
Preparation of Drought Vulnerability Assessment Study to Develop Iraq National Framework for Integrated Drought Risk Management (DRM) PAVING THE WAY FOR.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
Cybersecurity Policies & Procedures ICA
Audit Planning Presentation - Disaster Recovery Plan
Introduction to: National Response Plan (NRP)
Risk Mitigation & Incident Response Week 12
Presentation transcript:

Principles of Incident Response and Disaster Recovery Chapter 3 Incident Response: Preparation, Organization, and Prevention

Objectives Know the process used to organize the incident response process Understand how policy affects the incident response planning process and how policy can be implemented to support incident response practices Know the techniques that can be employed when forming a security incident response team (SIRT) Learn the skills and components required to devise an incident response plan Know some of the concerns and trade-offs to be managed when assembling the final IR plan Principles of Incident Response and Disaster Recovery

Introduction Contingency planning addresses everything done by an organization to prepare for the unexpected Incident response (IR) process: focuses on detecting or attempting to detect and evaluate the level of severity of unexpected events IR process should contain or resolve incidents If not possible to contain or resolve, other elements of contingency planning process are activated Principles of Incident Response and Disaster Recovery

Introduction (continued) Incident response process consists of: Preparation Detection and analysis Containment Eradication and recovery Post-incident activity This chapter focuses on preparation Principles of Incident Response and Disaster Recovery

Preparing for Incident Response When CPMT completes each component of the BIA, it transfers that information to the subordinate committees Subordinate committees follow these stages: Form the IR planning committee Develop the IR policy Organize the SIRT Develop the IR plan Develop IR procedures Two approaches: NIST (National Institute of Standards & Technology) CERT (Computer Emergency Response Team) Principles of Incident Response and Disaster Recovery

Preparing for Incident Response (continued) Principles of Incident Response and Disaster Recovery

Preparing for Incident Response (continued) Principles of Incident Response and Disaster Recovery

Preparing for Incident Response (continued) IR team must identify and engage stakeholders: Communities of interest such as general management, IT management, and InfoSec management Organizational departments such as Legal and HR Public Relations department General end users Other groups such as physical security, auditing and risk management, insurance, key business partners, contractors, temporary employee agencies, and consultants Principles of Incident Response and Disaster Recovery

Incident Response Policy IR Policy should be the first deliverable Security Incident Response Team (SIRT) should join the IR planning committee to develop policy IR policy: Defines the roles and responsibilities for incident response for the SIRT and others who will be mobilized Principles of Incident Response and Disaster Recovery

Incident Response Policy (continued) Principles of Incident Response and Disaster Recovery

Incident Response Policy (continued) Principles of Incident Response and Disaster Recovery

Incident Response Policy (continued) Principles of Incident Response and Disaster Recovery

Incident Response Policy (continued) Other teams should provide input: Disaster recovery Business continuity Other sources may include: Organization charts Topologies for systems and networks Critical system and asset inventories Existing disaster recovery, business continuity plans, incident response plans Parental or institutional regulations Existing security policies and procedures Principles of Incident Response and Disaster Recovery

Building the Security Incident Response Team SIRT may be a formal or informal team If formal, SIRT is a set of policies, procedures, technologies, people, and data necessary to prevent, detect, react, and recover from an incident Development of SIRT involves these stages: Collecting information from stakeholders Defining the IR team structure Determining the IR team services Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders IR planning committee must establish the scope and responsibilities of the SIRT Typical skills required of a SIRT team include: Virus scanning, elimination, and recovery System administration Network administration (switches, routers, gateways) Firewall administration Intrusion detection systems Cryptography Data storage and recovery (RAID, SAN) Documentation creation and maintenance Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Incident Response team analyzes incident data, determines impact, and acts to limit damage and restore normal services Possible team models: Central IR team Distributed IR teams Coordinating team Central IR team: One team handles incidents throughout the organization Effective for small organizations with minimal geographical diversity Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Distributed IR teams: Each team is responsible for a physical segment of the organization Effective for large organizations with major computing resources at remote locations Coordinating team: IR team provides guidance and advice to other teams but does not have authority over them Can be thought of as “a SIRT for a SIRT” Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) IR team possible staffing models: Employees: all IR work is performed by the organization Partially outsourced: e.g., offsite managed security services provider (MSSP) for 24/7 monitoring of intrusion detection sensors, firewalls, etc. Fully outsourced: all incident response work is outsourced Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Factors influencing selection of structure and staffing models: Need for 24/7 availability: available to respond, or be onsite 24/7 Full-time vs. part-time team members: dedicated to IR, or potentially available when needed Employee morale: IR work requires odd hours, on-call, stressful work Cost Staff expertise Organizational structure Outsourcing incident response Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) When considering outsourcing, consider these factors: Current and future quality of work Division of responsibilities Sensitive information revealed to the contractor Lack of organization-specific knowledge Lack of correlation among multiple data sources Handling incidents at multiple locations Maintaining incident response skills in-house Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) With any model, a single employee should be in charge of incident response If outsourced, this person oversees the service provider If in-house, this person is the team manager Team manager’s tasks include: Liaison with upper management and other teams Defusing crisis situations Ensuring the team has necessary personnel, resources, and skills Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) May also want to have a team technical lead: Has oversight of and final responsibility for quality of technical work performed by the IR team Do not confuse this with the incident lead person (primary point of contact for handling an incident) IR team members should have excellent technical skills and good problem-solving and troubleshooting skills IR team members should also have good communication, writing, and speaking skills Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Consider dependencies within organizations: what other groups need to participate in incident handling? IR team services can be grouped into 3 categories: Reactive services: triggered by an event or request Proactive services: provide assistance and information to prepare, protect, and secure systems Security quality management services: augment existing services related to security, such as auditing and training Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) Typical IR team services: Advisory distribution Vulnerability assessment Intrusion detection Education and awareness Technology watch and recommendations Patch management Principles of Incident Response and Disaster Recovery

Information Collection from Stakeholders (continued) NIST recommends that federal agencies: Establish IR capabilities Create IR policy Establish policies and procedures for information sharing Provide incident information to other organizations Select an IR team model Select the IR team members Determine which services the team should offer Principles of Incident Response and Disaster Recovery

Incident Response Planning Incident response plan: detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event Incident: an event that threatens the security of the organization’s information resources and/or assets, causing actual damage or other disruptions A threat turns into a valid attack if it has all of these characteristics: Directed against the organization’s information assets Has a realistic chance of success Threatens the confidentiality, integrity, or availability of information resources and assets Principles of Incident Response and Disaster Recovery

Incident Response Planning (continued) IR procedures are reactive measures, not preventive controls Chief Information Security Officer (CISO): has responsibility for creating an organization’s IR plan For every attack scenario and end case, IR team creates three sets of incident-handling procedures: During the incident After the incident Before the incident Principles of Incident Response and Disaster Recovery

Incident Response Planning (continued) IR planning team also adds other information: Trigger: circumstances that cause the IR plan to be initiated Notification method: manner in which the team receives notification of an incident Response time: time limit within which the team should respond Principles of Incident Response and Disaster Recovery

Planning for the Response During the Incident The reaction to the incident is the most important phase of the IR plan Trigger: the circumstances that cause the IR team to be activated and the IR plan to be initiated IR duty officer: a SIRT team member who is monitoring for signals of incidents Reaction Force: the individuals with the unique combination of skills needed to respond to the incident Principles of Incident Response and Disaster Recovery

Planning for the Response During the Incident (continued) Reaction Force Should be specified in the attack scenario end case Should include the scribe, archivist, or historian who develops and maintains a log of events for later review Actions taken during the incident: Verify an actual incident is occurring Determine the extent of exposure Attempt to contain or quarantine the damage Continue to look for small “flare-ups” Principles of Incident Response and Disaster Recovery

Planning for After the Incident Planning after the incident should describe: Stages necessary to recover from the most likely events of the incident Protection from follow-on incidents Forensics analysis Action-after review Process of systematically examining information assets for evidentiary material Requires proper training to ensure that evidence is not compromised Principles of Incident Response and Disaster Recovery

Planning for After the Incident (continued) After-action review (AAR): Detailed examination of all events from detection to recovery Includes where the IR plan worked and didn’t work Can serve as a training case for future staff Is the final action of the IR team for the incident Principles of Incident Response and Disaster Recovery

Planning for Before the Incident Before actions: Implement good information technology and information security practices Implement preventative measures to manage risks Ensure preparedness of the IR team Training the SIRT: Can use national training programs such as SANNS, Dept. of Homeland Security, US CERT Major hardware/software vendors also provide IR training Use online resources Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) IR Plan must be tested to identify vulnerabilities, faults, and inefficient processes Testing strategies: Desk check Structured walk-through Simulation Parallel testing Full interruption War gaming Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Desk check: review the plan and create a list of correct and incorrect components Structured walk-through: Walk through the actual steps and discuss actions Can be on-site, or a “chalk-talk” Entire team works together Simulation: Simulate the performance of each task Individuals work on their own Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Parallel Testing: Individuals act as if an incident had occurred, but without interfering with normal operations Full Interruption: Individuals follow each and every procedure, including interruption of service, restoration of data from backups, and notification of appropriate individuals Most rigorous, but also very risky War Gaming: Realistic, head-to-head attack and defend information National competition: Black Hat, DEFCON Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Common war-gaming strategies: Capture the flag King of the hill Computer simulations Defend the flag Online programming-level war games Provide tools and resources for the SIRT Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Training the Users Responsibility of the organization’s Security Education Training and Awareness group (SETA) Should include: Recognizing and reporting an attack Mitigating damage Good information security practices Must train general users, managerial users, and technical users Training for General Users Should be made aware of the plan Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Training for Managerial Users: Same as general users, but more personalized May require pressure from champion or support at executive level Training for Technical Users: More detailed, and may require use of outside training organizations Training techniques and delivery methods Many possibilities Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Principles of Incident Response and Disaster Recovery

Planning for Before the Incident (continued) Principles of Incident Response and Disaster Recovery

Assembling and Maintaining the Final Incident Response Plan Draft plans can be used for training staff and testing steps to validate the effectiveness Testing does not stop once the final plan is created Each scenario should be tested at least semiannually Final plan should be considered classified information, but should be placed in an easy to access location Principles of Incident Response and Disaster Recovery

Assembling and Maintaining the Final Incident Response Plan (continued) Principles of Incident Response and Disaster Recovery

Summary Incident response process includes preparation, detection, mitigation, and post-incident analysis IR committee follows these stages: Form the IR planning committee Develop the IR policy Organize the SIRT Develop the IR plan Develop IR procedures Staff the IR team with stakeholders from various parts of the organization Principles of Incident Response and Disaster Recovery

Summary (continued) Create the IR policy SIRT is a set of policies, technologies, people, and data necessary to protect, detect, react, and recover from anything that may damage the organization’s information 3 stages to develop the SIRT: Collect information from stakeholders Define the IR team structure Determine the IR team services Principles of Incident Response and Disaster Recovery

Summary (continued) Possible models for IR teams: Central incident response team Distributed incident response teams Coordinating team Possible staffing models include employees, partially outsourced, and fully outsourced SIRT services may include reactive and proactive services, security quality management, advisory distribution, vulnerability assessment, intrusion detection, education and awareness, technology watch, and patch management Principles of Incident Response and Disaster Recovery

Summary (continued) IR plan contains detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event IT team creates an incident plan with three sets of incident-handling procedures: During the incident Before the incident After the incident Principles of Incident Response and Disaster Recovery