5
Managing the CSIRT Infrastructure Components Table of Contents Notices ............................................................................................................................................ 2 Managing the CSIRT Infrastructure................................................................................................. 2 Purpose ........................................................................................................................................... 3 Infrastructure Components ............................................................................................................ 4 Outline ............................................................................................................................................ 5 Page 1 of 5

Managing the CSIRT Infrastructure Components

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Managing the CSIRT Infrastructure Components

Table of Contents

Notices ............................................................................................................................................ 2

Managing the CSIRT Infrastructure ................................................................................................. 2

Purpose ........................................................................................................................................... 3

Infrastructure Components ............................................................................................................ 4

Outline ............................................................................................................................................ 5

Page 1 of 5

Notices

41Managing CSIRTs© 2020 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.

Managing the CSIRT Infrastructure

1Managing CSIRTs© 2020 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.

Software Engineering Institute

Carnegie Mellon University

Pittsburgh, PA 15213

[DISTRIBUTION STATEMENT A] Approved for public release

and unlimited distribution.

Managing the CSIRT Infrastructure

Managing Computer Security

Incident Response Teams

(CSIRTs)

**001 Hello, This module is Managing

the CSIRT Infrastructure.

Page 2 of 5

Purpose

2Managing CSIRTs© 2020 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.

Purpose

To provide an overview of the components of a CSIRT infrastructure

To discuss various issues in managing this infrastructure

To outline how and why to protect CSIRT data and information

**002 The purpose of this module is

to provide an overview of the

components that make up the CSIRT

infrastructure, not only computer

security but laboratory space, office

space, what have you, to discuss the

various issues related to managing

this infrastructure and to outline how

and why to protect the CSIRT data

and information that you have within

your organization.

Page 3 of 5

Infrastructure Components

3Managing CSIRTs© 2020 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.

Infrastructure Components

The CSIRT infrastructure includes

• physical location and security of CSIRT staff and data

• staff office and home equipment

• CSIRT networks, systems, and internal/external defenses such as routers, firewalls,

and IDS

• CSIRT tools and applications to support incident handling and other provided services

- databases, data repositories, and data analysis tools for storing CSIRT and incident

information

- mechanisms or applications for secure email and voice communications

- test labs or test environments for analyzing malicious code and vulnerabilities

• organizational data classification schemas

**003 So the infrastructure consists

of all of these things: the physical

location and security of the staff and

the data; this includes office staff and

especially these days home

equipment, where people work

remotely not only from home but

they may relocate temporarily for

other reasons; you need to take into

account all of those places. The

CSIRT network; systems; internal

and external defenses, meaning

routers, firewalls, intrusion detection

systems, intrusion prevention

systems; and then also all of the

tools and applications and the

databases that those tools are used

to create. Whatever data

repositories, data analysis tools,

incident information; the mechanisms

for secure email like PGP keys, voice

communications, secure voice, secure

fax, what have you; and then also

test labs where you may have

Page 4 of 5

malicious code or you're exploring

vulnerabilities. All of these need to

be secured, taking into account your

data classification schemes.

Outline

4Managing CSIRTs© 2020 Carnegie Mellon University

[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.

Outline

Data security

Physical security

Equipment

Networks and systems

CSIRT tools

**004 When we talk about securing

the infrastructure for a CSIRT, we're

really talking about these five things.

We're talking about securing data

that the CSIRT gets its hands on,

physical security of office space,

etcetera, the equipment, networks

and systems, and finally CSIRT tools.

Now, as has been said before, data

security is particularly important

because CSIRTs get intellectual

property from their constituency and

log files which can contain credentials

as well as other sensitive information.

So this makes a CSIRT a target for

intruders to gain access to information

of their constituencies that can then be

used to attack those constituencies.

Page 5 of 5