Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Incident Management Processes Introduction
Table of Contents
Notices ............................................................................................................................................ 2
Incident Management Processes: Introduction, Prepare and Protect ........................................... 2
Purpose ........................................................................................................................................... 3
Building Your Incident Management Plan ...................................................................................... 4
What Supports Your IM Plan? ......................................................................................................... 6
Page 1 of 7
Notices
19Managing CSIRTs© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Incident Management Processes: Introduction, Prepare and Protect
1Managing CSIRTs© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213
[DISTRIBUTION STATEMENT A] Approved for public release
and unlimited distribution.
Incident Management Processes: Introduction, Prepare and Protect
Managing Computer Security
Incident Response Teams
(CSIRTs)
**001 Hello. This module is Incident
Management Processes.
Page 2 of 7
Purpose
2Managing CSIRTs© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Purpose
To understand the various processes involved in incident management.
To review best practices associated with incident management activities.
**002 The purpose of this module is
to understand the various processes
involved in incident management and
to review some best practices
associated with these incident
management activities.
Page 3 of 7
Building Your Incident Management Plan
3Managing CSIRTs© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Your IM plan details what
IM processes are
performed across your
enterprise, including
• relationships between
processes
• who performs them
• existing interfaces
• inputs and outputs
What should be in your IM plan?
• organizational group responsible for each IM function
• detailed roles and responsibilities
• defined interfaces between functions
• defined event and incident criteria
• point of contact for reporting events and incidents
• timeframe for reporting and handling incidents
• workflows for handling incidents
• emergency situations
• response actions for specific types of incidents
• postmortems and feedback activities
Building Your Incident Management Plan
**003 Every CSIRT should have an
incident management plan for the
organization that they're part of or
their constituency. The whole idea of
this is to define all of these in
advance. Again, as has been said
before, don't wait until the first fire to
form the fire company. So you need
to decide all of these things in
advance: what groups are
responsible for each part of the
incident management function; what
are the roles and responsibilities of
the people that are involved with
those; what are the interfaces
between those functions--are they
paper, are they email, are they faxes,
are they on a wiki, whatever.
Defining an event and an incident.
Now it would seem as though there
are very common things that you
think would be defined, but it
sometimes can be an issue. It's
Page 4 of 7
important to understand what a
security event is and what a security
incident is. And again, you can find
definitions of these from other
organizations on FIRST.
Who is the point of contact for
reporting events and incidents?
Anybody within the organization, the
constituency that this CSIRT
supports, ought to know what to do
with incidents and events and who to
report them to.
Timeframe for reporting. Sometimes
the timeframe depends upon external
sources-- for example, compliance to
state, local, and federal government
levels. What are the workflows for
handling incidents? Where does the
information begin? Who does it go
to? What do they do with it?
Etcetera.
Emergency situations that show up--
off hours is one example-- and a
response plan for specific types of
incidents. If it's a virus, what do you
do? If it's a loss of intellectual
property, what do you do? If it's a
loss of personally identifiable
information what do you do? If it's a
loss of customer information?
And finally, post mortems and
feedback. The idea here is that
every point in time when you finish
an incident or an event, review
what's happened to make sure that
you've had the correct policies and
procedures in place, that people
knew what they were supposed to
do, and the right or the wrong things
Page 5 of 7
happened, and make the changes as
is appropriate.
What Supports Your IM Plan?
4Managing CSIRTs© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
What Supports Your IM Plan?
Governance support of IM plan
Recognition of the importance of IM
Risk analysis and resulting output
Information classification scheme
Incident criteria
• definition of incident
• prioritization
• categorization
• escalation
Incident reporting policy, guidelines and reporting template
Critical systems and data inventories
Guidelines for handling Personally Identifiable Information (PII)
**004 Here's a list of items that
support your incident management
plan. For example, governance. You
may have governing bodies above
you dictating certain things that may
be in your plan. Recognition of the
importance of the incident
management plan throughout your
organization. Risk analysis. The
intent of risk analysis is to identify
the critical information assets and
business processes to keep the
business in working order, and by
understanding their importance you
can focus on what the most
important issues are, what the most
important assets are, and deal with
them sooner rather than later.
Some notion of information
classification. The traffic light
Page 6 of 7
protocol spoken about previously
comes into play here. Incident
criteria. What is an incident? What
are the priorities of an incident? How
are incidents categorized and how
are incidents escalated as they go on
when they become more important?
There needs to be an incident
reporting policy, guidelines and a
template. People are much more
able to fill out a template with
dropdowns, with any kind of an
interface, and provide the necessary
information needed to start an
incident if you have that kind of a
mechanism.
It's also important that people, at
least in the CSIRT and around the
organization, better understand what
the critical systems are and what the
critical data inventories are. Again,
you'd think that that would be
something that would be commonly
understood and known but that's not
always the case.
And finally, guidelines for handling
PII, personally identifiable
information. These days more and
more states are defining that a
breach that involves a loss of PII
requires different levels of notification
of the other people involved in that
company, and so you need to be
aware of that.
Page 7 of 7