53
MAKING AN IMPACT ON U.S. MANUFACTURING Recovering from a Cybersecurity Incident What to do Before and After Patricia Toth NIST MEP

Recovering from a Cybersecurity Incident

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Recovering from a Cybersecurity Incident

M A K I N G A N I M P A C T O N U . S . M A N U F A C T U R I N G

Recovering from a Cybersecurity Incident

What to do Before and AfterPatricia TothNIST MEP

Page 2: Recovering from a Cybersecurity Incident

MEP Overview

Confidentiality

Integrity

Availability

Unauthorized Access, Disclosure

Unauthorized Modification, Use

Disruption, Destruction

What is Information Security?

2

Page 3: Recovering from a Cybersecurity Incident

MEP Overview

What is Information Security?

3

Cyber-security

Privacy

Physical Security

Contingency Planning &

Disaster Recovery

Operational Security

Personnel Security

Page 4: Recovering from a Cybersecurity Incident

MEP Overview 4

NIST Cybersecurity Framework

Identify

Protect

DetectRespond

Recover

Page 5: Recovering from a Cybersecurity Incident

MEP Overview 5

NIST SP 800-184

GUIDE FOR CYBERSECURITY EVENT RECOVERY

https://doi.org/10.6028/NIST.SP.800-184

Page 6: Recovering from a Cybersecurity Incident

MEP Overview

Recover• “The development and implementation of plans,

processes and procedures for recovery and full restoration in a timely manner, of any capabilities or services that are impaired due to a cyber event”

6

Page 7: Recovering from a Cybersecurity Incident

MEP Overview

What is a Cybersecurity Event?• Any observable occurrence in a system or network

7

Page 8: Recovering from a Cybersecurity Incident

MEP Overview

What is a Cybersecurity Incident?• Violation or imminent threat of violation of computer

security policies, acceptable use policies, or standard security practices.

8

Page 9: Recovering from a Cybersecurity Incident

MEP Overview

IncidentActually or Potentially results in:• Adverse Consequences• Adverse effects• Poses threat toan information system or the information that system processes, stores, or transmits and that may require a response action to mitigate the consequences.

9

Page 10: Recovering from a Cybersecurity Incident

MEP Overview

Incident Examples• Attempts to gain unauthorized access to a system• Unwanted disruption or denial of service• Unauthorized use of a system• Changes to system HW, FW or SW characteristics

without the owner's knowledge, instruction, or consent

10

Page 11: Recovering from a Cybersecurity Incident

MEP Overview

Examples of Incidents• An attacker commands a botnet to send high volumes of

connection requests to a web server, causing it to crash. • Users are tricked into opening a “quarterly report” sent via

email that is actually malware; running the tool has infected their computers and established connections with an external host.

• An attacker obtains sensitive data and threatens that the details will be released publicly if the organization does not pay a designated sum of money.

• A user provides or exposes sensitive information to others through peer-to-peer file sharing services.

11

Page 12: Recovering from a Cybersecurity Incident

MEP Overview

Cyber Event• Specific cybersecurity incident or• Set of related cybersecurity incidents that result in

successful compromise of an information system

12

Page 13: Recovering from a Cybersecurity Incident

MEP Overview

Recovering• Simple– Sys Admin restores from backup

• Complex– People– Processes– Technologies

13

Page 14: Recovering from a Cybersecurity Incident

MEP Overview

Incident Response Lifecycle

Preparation & Planning

Detection & Analysis

Containment Eradication &

Recovery

Post Incident Activities

14

Page 15: Recovering from a Cybersecurity Incident

MEP Overview

NIST Cybersecurity Framework

Identify ProtectDetect Cyber Event

Respond to Cyber

Event

Remediate Root

Cause

Tactical Recovery

Phase

Strategic Recovery

Phase

15

Page 16: Recovering from a Cybersecurity Incident

MEP Overview

Prepare & Plan• Prepare for resilience• Plan to operate in a diminished capacity• Restore services based on priorities

16

Page 17: Recovering from a Cybersecurity Incident

MEP Overview

Prepare & Plan• Identify key people• Understand roles and responsibilities• Create & maintain list of assets– People, processes, technology– Mission critical

• Have a plan– Tech and Non-Tech

• Practice Recovery

17

Page 18: Recovering from a Cybersecurity Incident

MEP Overview

Prepare & Plan• Conditions for Recovery– Who has authority to invoke– How personnel are notified

• Define key milestones including termination of active recovery efforts

• Adjust incident detection and response policies • Develop Recovery communications plan• Define Recovery communication goals, objectives

and scope

18

Page 19: Recovering from a Cybersecurity Incident

MEP Overview

Continuous Improvement• Gather feedback• Exercises and tests• Post exercise debriefs• Lessons learned• Identify weaknesses• Validate recovery capabilities• Document issues

19

Page 20: Recovering from a Cybersecurity Incident

MEP Overview

Recovery Metrics• Understand what should be measured• Implement processes to collect relevant data.• What metrics are most useful?• Activities that cannot be measured in accurate or

repeatable way

20

Page 21: Recovering from a Cybersecurity Incident

MEP Overview

Incident Damage and Cost• Direct and indirect costs• May be important evidence• Costs– Loss of competitive edge– Legal costs– Hardware, software, and labor costs– Business disruption– Loss of brand reputation or customer trust

21

Page 22: Recovering from a Cybersecurity Incident

MEP Overview

Risk Assessment Improvement• Frequency and/or scope of recovery exercises and

tests• Number of significant IT-related incidents that were

not identified in risk assessment• System dependencies accurately identified• Identified gaps during the recovery exercises or

tests that help inform and drive the improvement in the other functions of the CSF

22

Page 23: Recovering from a Cybersecurity Incident

MEP Overview

Quality of Recovery Activities• Number of business disruptions due to IT service

incidents• Level of customer satisfaction• Percent of IT services meeting uptime requirements• Percent of successful and timely restoration from

backup or alternate media copies• Number of successful recovery events

23

Page 24: Recovering from a Cybersecurity Incident

MEP Overview

Incident Examples• Botnets • Phishing Attack• Ransomware• Information sharing

24

Page 25: Recovering from a Cybersecurity Incident

MEP Overview

Building a Playbook• Tactical Phase– Initiation– Execution– Termination

• Strategic– Planning and Execution– Metrics– Recovery plan improvement

25

Page 26: Recovering from a Cybersecurity Incident

MEP Overview

Building a Playbook - TacticalTacticalPeople, process, and technology assetsDependencies among these assetsMap or diagram of the dependencies

26

Page 27: Recovering from a Cybersecurity Incident

MEP Overview

Building the Playbook - Tactical• Categorize all assets• Identify key people ensure they understand their

roles and responsibilities• Ensure correct underlying assumptions• Conditions when recovery plan invoked• Authority to invoke the plan• How recovery personnel will be notified• Milestones, intermediate goals, and criteria for

finalizing 27

Page 28: Recovering from a Cybersecurity Incident

MEP Overview

Building the Playbook - Tactical• Prevent recovery from negatively affecting the

incident response• Examine the cyber event and initiate the plan for

recovery• Recovery communications plan • Consider sharing actionable information

28

Page 29: Recovering from a Cybersecurity Incident

MEP Overview

Building the Playbook - Tactical• Gather feedback • Cyber event recovery exercises and tests • Update cyber event recovery plans, policies, and

procedures• Improve cybersecurity posture• Vet recovery capabilities

29

Page 30: Recovering from a Cybersecurity Incident

MEP Overview

Building the Playbook - Tactical• Execute the tailored playbook that has been created

during the cyber event • Document issues • Implement monitoring for events• Monitor the artifacts and evidence found during

detection and response• Monitoring will extend into the strategic phase.

30

Page 31: Recovering from a Cybersecurity Incident

MEP Overview

Playing the Playbook - StrategicPerform before and during the cyber event:• Cybersecurity improvement plan based on tactical

phase results• Execute communications plan • Review milestones, goals, and metrics gathered

throughout the tactical phase

31

Page 32: Recovering from a Cybersecurity Incident

MEP Overview

Cyber Event Recovery ScenarioNetwork Breach• Anomalous activity detected • Stolen credentials to gain access critical business

systems• Jeopardizes trustworthiness• PII• Possible customer financial data stolen

32

Page 33: Recovering from a Cybersecurity Incident

MEP Overview

Event Pre Conditions• Set of formal recovery processes• List of critical people, facilities, technical

components, and external services• Playbook identifies the data breach recovery team

33

Page 34: Recovering from a Cybersecurity Incident

MEP Overview

Event Pre Conditions• A current set of functional and security dependency maps• Metrics including:– Costs– Lost revenue due to business downtime– New services to restore customers’ trust– Accuracy of dependencies maps– Gaps identified in the playbook– Customer satisfaction– Service level agreements– Confidence level around quality of the backups– Quality of recovery plan and data breach playbook

34

Page 35: Recovering from a Cybersecurity Incident

MEP Overview

Event Pre Conditions• Resources and tested tools• Recovery communications plan • Periodic training and exercises

35

Page 36: Recovering from a Cybersecurity Incident

MEP Overview

Event Tactical Recovery PhaseInitiationNetwork-based communications insecure and cannot be trustedPersonal and credit card informationFind footprintsActivities in environmentSystems impacted Entry point identifiedCompromised users and administrative accounts are identifiedInfrastructure systems need to be remediated

36

Page 37: Recovering from a Cybersecurity Incident

MEP Overview

Event Tactical Recovery Phase

InitiationWork with IR teamMeet with business owners Start with data breach playbookDetermine last known good state of the dataEnable additional security controlsRecovery activities might alert the adversary Work with the IR team to increase the level of monitoring and strengthen the isolation capabilitiesDetermine order in which systems will be restoredRecovery process is ready to begin Identified metrics are recorded and tracked by the responsible parties

37

Page 38: Recovering from a Cybersecurity Incident

MEP Overview

Event Tactical Recovery PhaseExecution• Follow modified data breach recovery playbook• Monitor and strengthen isolation capabilities • Resources and functions restored• Additional security controls implemented • Not susceptible to the original system weaknesses

and are ready to be restored• Execute recovery plan

38

Page 39: Recovering from a Cybersecurity Incident

MEP Overview

Event Tactical Recovery PhaseExecutionTrack the downtime of critical systems and services Advise managementDocument any issues that arise Notification activitiesAdditional recovery steps initialized

39

Page 40: Recovering from a Cybersecurity Incident

MEP Overview

Event Tactical Recovery PhaseTermination• Data has been restored to a known good state• Vulnerabilities remediated• Adversary is no longer in the environment• End of the tactical recovery event • Recovery team finalizes the findings, metrics, and

lessons learned collected during the event

40

Page 41: Recovering from a Cybersecurity Incident

MEP Overview

Event Strategic Recovery PhasePlanning and Execution• Support communication teams• Recovery teams close the loop with external entities • Plan developed to fully correct the root causes • IT Team implements long-term improvement plan

41

Page 42: Recovering from a Cybersecurity Incident

MEP Overview

Event Strategic Recovery PhaseMetrics• After-action review • Review key milestones

42

Page 43: Recovering from a Cybersecurity Incident

MEP Overview

Event Strategic Recovery PhaseRecovery Plan Improvement• Team performance• Continually improve cyber event recovery plans,

policies, and procedures

43

Page 44: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a Playbook

Pre-Conditions Required for Effective Recovery• Set of formal recovery processes• Criticality of organizational • Functional and security dependency maps • List of technology and recovery personnel • Comprehensive recovery communications

44

Page 45: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a PlaybookTactical Recovery Phase - InitiationBriefing from IR Team Determine the criticality and impactFormulate an approach and set of specific actionsHeighten monitoring and alerting of the network and systemsUnderstand the adversary’s motivationIdentify the adversary’s footprintsInform all parties that the recovery activities have been initiatedUtilize all available information to create plan

45

Page 46: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a Playbook

Tactical Recovery Phase – Execution• Execute the restoration • Restore additional business services • Track outage time • Document any issues that arise • Coordinate with management • Additional recovery steps • Validate the restored assets are fully functional and

meet the security posture

46

Page 47: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a Playbook

Tactical Recovery Phase – Termination• Criteria met• Declare the end of the tactical recovery event• Stand down recovery team• Continue to monitor the infrastructure• Finalize the metrics collected during the event

47

Page 48: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a Playbook

Strategic Recovery Phase – Planning and Execution• Support the various communication teams • Close the loop with external entities• Develop a plan to correct the root cause of the

cyber event• Implement changes to strengthen security posture

48

Page 49: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a Playbook

Strategic Recovery Phase – MetricsReview metrics collectedReview achievement of key milestones and assumptions that were made pre-recovery

49

Page 50: Recovering from a Cybersecurity Incident

MEP Overview

Checklist of Elements Included in a Playbook

Strategic Recovery Phase –Recovery Plan Improvement• Use lessons learned recovery to enhance the

recovery plan

50

Page 51: Recovering from a Cybersecurity Incident

MEP Overview

Business Emergency Plan• https://www.ready.gov/sites/default/files/documents/

files/sampleplan.pdf

51

Page 52: Recovering from a Cybersecurity Incident

MEP Overview 52

Questions?

Page 53: Recovering from a Cybersecurity Incident

M A K I N G A N I M P A C T O N U . S . M A N U F A C T U R I N G

Pat TothCybersecurity Program [email protected]

53