Cyber Incident Response: 1.0 Purpose and Benefits
Cyber Incident Response: 1.0 Purpose and Benefits
Cyber Incident Response: 1.0 Purpose and Benefits
No:
Information Technology Standard
IT Standard: Updated:
Issued By:
Cyber Incident Response
Owner:
2.0 Authority
[Organization Information]
3.0 Scope
[Scope needed]
1– 2– 3– 4– 5– 6–
Preparation Identification Containment Eradication Recovery Lessons-
Learned
Step 1: Preparation
Proper planning and preparation for an incident before it occurs ensures a more
effective and efficient IR process. Activities associated with this step, include
establishing IR teams; updating IR tools, policies/procedures, and forms/checklists;
and ensuring IR communication procedures and IR stakeholder contact lists are
accurate and up-to-date. An entity must have a defined and up to date Contact List
and establish multiple communication channels with all entities and individuals on the
IR Contact List.
An entity must assign responsibility for a central point of contact to coordinate
identification and reporting up to the CISO. Typically, this is performed by the entity’s
designated security representative. As per the Information Security Policy, all
employees are required to report suspected information security incidents or
weaknesses to the appropriate manager and designated security representative.
1
Based on the SANS Institute Incident Handling Step-by-Step
Incident Categories
Category Name Description
0 Exercise / Used during state, federal, international exercises and
Network approved activity testing of internal/external network
Defense Testing defenses or responses.
2
http://www.us-cert.gov/government-users/reporting-requirements
Escalation Procedures
During an incident, clear and effective communication is critical. As such, an
escalation procedure should address all lines of communication in the event an
incident occurs. This includes not only internal communication but external
communications as well. Communication should flow through all involved IR
stakeholders so that everyone has the necessary information to act and carry out their
responsibilities in a timely manner. Notification must be made as soon as possible but
should not delay the entity from taking appropriate actions to isolate and contain
damage.
Each entity must have an IR escalation procedure that consists of (1) an escalation
matrix, (2) an up-to-date contact list with alternate contacts, and (3) multiple
communications channels, all in an effort to ensure appropriate and accurate
information is disseminated quickly to the appropriate IR stakeholders.
Incident Scoping
Initial scoping is provided by the entity and includes:
Identifying potential targets (e.g., known compromised systems, likely affected
systems, key systems);
Defining external touch points (e.g., Internet, wireless, 3rd party, remote access
connections);
Prioritizing likely scenarios (e.g., internal vs., external threat, targeted attack
vs., target of opportunity); and
Visualizing in-scope environment (e.g., network diagram, data flow).
Considerations for incident scoping activities are as follows:
Relying on relevant and verified evidence sources;
Reducing false positives and volume of data;
This step focuses on containing the threat to minimize damage. It is during this step
that information is collected to determine how the attack took place. All affected
systems within the enterprise should be identified so that containment (and eradication
and recovery) is effective and complete.
Incident containment involves ‘stopping the bleeding’ and preventing the incident from
spreading. Containment can be accomplished by isolating infected systems, blocking
suspicious network activity, and disabling services among other actions. Containment
varies for each incident depending on the severity and risk of continuing operations.
Entity leadership makes decisions regarding containment measures based on
recommendations from the CISO.
Step 4: Eradication
Eradication involves removing elements of the threat from the enterprise network.
Specific eradication measures depend on the type of incident, number of systems
involved, and the types of operating systems and applications involved. Typical
Once the root cause of an incident has been eradicated, the recovery phase can
begin. The goals of this step are to: (1) remediate any vulnerabilities contributing to
the incident (and thus prevent future incidents) and (2) recover by restoring operations
to normal. A phased approach is often used to return systems to normal operation,
harden them to prevent similar future incidents and heighten monitoring for an
appropriate period of time. Typical recovery activities include rebuilding systems from
trusted images/gold standards, restoring systems from clean backups and replacing
compromised files with clean versions.
Care must be taken to ensure that files restored from backup do not reintroduce
malicious code or vulnerabilities from the incident and that the system is clean and
secure before returning to production use. Once recovery has been completed, the IR
lead must validate/certify that the incident has been resolved.
Step 6: Lessons Learned
IR Metrics
Category Measurement Description
Incidents # Total Incidents / Year Total amount of incidents responded to per
year
# Incidents by Type / Year Total number of incidents by category
responded to per year
Time # Personnel Hours / Incident Total amount of labor spent resolving
incident
# Days / Incident Total amount of days spent resolving
incident
# System Down-Time Hours / Total hours of system down-time until
Incident incident resolved
Cost Estimated Monetary Cost / Total estimated monetary cost per incident,
Incident to include containment, eradication, and
recovery, as well as collection & analysis
activities (this may include labor costs,
external entity assistance, tool
procurements, travel, etc.)
Damage # Systems Affected / Incident Total number of systems affected per
incident
# Records Compromised / Total number of records compromised per
Incident incident
Forensics # Total Forensics Leveraged Total number of incidents requiring
Incidents / Year forensics (collection & analysis) per year
# System Images Analyzed / Total number of system images analyzed
Incident per incident
# System Memory Dumps Total number of system physical memory
Examined / Incident dumps examined per incident
Term Definition