Developing an Effective Incidence Response Plan
|
|
|
- Stephany Atkinson
- 10 years ago
- Views:
Transcription
1 DATACOM SYSTEMS INC Developing an Effective Incidence Response A guide for converged networks A DATACOM SYSTEMS WHITE PAPER
2 Vital Data Incident Response is defined as a specific process developed and designed to ensure an approved and appropriate response to a variety of events. Information Technology management has historically been plagued by after-hour calls, to attend to an urgent network crisis. Improved cabling, device stability and end-user education has improved uptime in most networks. With improvements in technology and reliability, the dependence on networked systems has increased. Converged systems carry vital data applications, e-commerce, and voice traffic on a single network. As organizations continue to migrate to a true converged cable plant in the Voice Over Internet Protocol (VOIP) environment, the responsibility of network professionals to prevent minor traffic congestion will escalate. Security concerns and increasing malware replication speeds require well-prepared, coordinated and timely responses to any type of incident. A fast, efficient, comprehensive response plan is necessary for organizations to ensure they maintain critical business processes and customer confidence. Incident Response can be defined as a specific process developed and designed to ensure an approved and appropriate response to a variety of events. An incident response plan prepares for the occurrence of an unintended event. The plan will analyze the events impact on the organization, collect data, and suggest a response. When the business processes have returned to their normal state, the Incident Response (IR) plan reviews the process and response of the event in order to improve the plan. An IR plan is a small part of the total planning and preparation documentation required for an organization to respond properly to an event. Additional documentation may include Disaster Recovery, Business Continuity and Communication s. Some businesses consolidate the documents described, into a single plan. This single document is difficult to understand, maintain and use during an event. Multiple documents are easier to maintain, use and get approved by senior management. A brief overview of supporting documentation is required to understand the role of the IR plan. A Disaster Recovery (DR) plan organizes the process of declaring an emergency or event. Responsible parties are identified that have the authority to notify, engage and approve resources, declare the emergency and perform damage assessments. The communication between departments to conduct these tasks is identified under the DR plan. Once a disaster has been declared, a process is initiated to contact specific individuals, internal or external within the organization. The process may be in either the DR or Business Continuity (BC) plan, depending on the scope of the event. Contact information is in the Communication. Contact information is required for both internal and external resources. For example, in the case of a Security Breach, law enforcement may be involved. In the case of an application failure, the software vendor maintenance contract may be activated to support the recovery of the program or data. individual contacting agency to authenticate itself with approved vendors. These confidential numbers will not normally be made available to everyone who gets a copy of the communication plan. Multiple versions or appendices of the Communication may exist to restrict access to sensitive information. The Business Continuity (BC) plan prioritizes applications or systems based upon function, financial or public impact to the organization. This will mandate system priority and focus for any recovery techniques. The BC plan organizes recovery strategies for specific components or functions and considers external support such as insurance and external vendor selection. Focus is upon maintaining the business function, and fully recovering the function when appropriate. An example may include the loss of the order processing function. If an order processing function, or access to the system goes down, an Application Service Provider may be engaged to provide emergency order processing services, from a facility outside of the geographic area, which has the authority to redirect e-commerce traffic, and possibly DNS or MX tables. The Communication will provide contact information for all responsible agents in the organization, and third party or supporting companies. The communication plan will include Customer, Account, Authorization Numbers or passwords to allow the 2 Developing an Incident Response WHITE PAPER Developing an Incident Response 3
3 Effective response Effective response to an incident requires that it is properly classified. Each company is going to organize their disaster planning documentation according to their business model. The below figure identifies disaster planning documents. This allows each document to be specifically focused on key areas, while referring to other documents for specific details related to an event. Departments or groups will maintain and update each plan on a regular basis. For example, the Communication will be updated frequently, since it will contain Names, Phone Numbers, Addresses and Authorization Codes. The DR plan would change less frequently and would probably not mention specific names, but titles when referring to responsible parties. Once the goal of each document is understood, their function and use during an event becomes clear to the individuals involved. The process of a damage assessment, declaring an emergency/event and authorization for a response, is contained in the DR plan. The damage assessment process will authorize an appropriate level of response. The DR processes require data and response recommendations provided from the IR plan. An example in this document clarifies the relationships between the documents. Disaster Recovery Identifies Responsible Individuals or Groups Identifies Process to Declare an Emergency/Event Identifies Damage Assessment Process Process to Authorize a Response to Damage Assessment Typical Emergency Response Documentation The detail of collecting, organizing and recommending a response is within the scope of the IR plan. The IR plan will provide information to and receive guidance from the other plans. Once notified of an event, the IR plan will determine how many systems are affected and provide that information back to the appropriate executive to declare an emergency or event. This IR process begins during the Classification phase. Business Continuity Prioritizes Applications and Business Processes Identifies Procedures to Bypass Applications or Business Processes Incident Response Classification Data Collection Determine/Conduct Response Evaluate Response Gather Evidence Communication Lists Primary, Secondary and Tertiary Methods of Contacting Interested Parties Provides data to authenticate site for maintenance or contracted emergency response Classification Effective response to an incident requires that it is properly classified. While there are numerous natural and unnatural events, the key is to quickly classify the type of event, and systems that it can or will affect. Identify responses under categories, based upon the level of impact to the core business processes of the organization, for example: Response Classification Name Alpha Bravo Charlie Delta Impact Impacts one or more critical business processes Degrades one or more critical business processes Degrades a non-critical business process No business processes are impacted, response required for legal or informational purposes The response classification may dictate how fast the IR team responds, who makes up the team, or how fast they notify specific executives, employees or media outlets. Authority may be granted to specific individuals to purchase equipment, coordinate services, contact third party support, or activate disaster recovery sites or vendors as needed. Sustaining critical business systems evolves from an understanding of how the systems work, interrelate and are restored. Knowing critical process vulnerabilities is the first step to securing them. System security reviews, help you identify points of failure and leads to a risk assessment. The risk assessment provides a guideline of the common attack vectors and areas at risk to the organization. Attack vectors dictate the type of Intrusion Prevention to deploy and method of Eradication. When a system has been compromised, pertinent attack vectors, allow an IR team to quickly conduct a damage assessment, to determine the extent of system degradation. Running down the list of attack vectors quickly identifies what type of containment is necessary to prevent the issue from spreading to other systems. A quick review of the pertinent information about each critical system can assist during the classification process. The following triage table is provided as an example: Critical System Triage Table Server Name Server IP OS OS Patch Level AV Patch Level CPU Utilization Memory Disk Space Date/Time Orders VOIP Finance Web 4 Developing an Incident Response Developing an Incident Response 5
4 Data collection Do not force your IT personnel to gather data for the first time during a crisis. The classification process is a triage type method to quickly determine if a business process is at risk, and quickly provide that information to the appropriate business owner. Data Collection Collecting data across multiple devices and network segments is critical during an emergency. Gathering network analysis data quickly and effectively across multiple network segments during an outage or security breach is usually difficult to correlate, even with advanced tools. A variety of methods and tools can be used to accomplish this process. Some items that may need to be collected or reviewed would include: network management software, log files, intrusion detection systems, application monitoring devices, and firewall, router or Ethernet switch logs, RADIUS or TACACS logs, critical server system logs, VOIP Server logs, or access attempts into protected folders or files. Understand what type of information is required for each type of incident. Know how you are going to collect that data, and which tools are required. Who has the appropriate access to the tools or the systems the tools collects data from. Many IT professionals use jump kits which are preloaded backpacks that have a variety of software, tools and supplies to analyze their network remotely. The jump kit is prepared so that it can be carried by someone that is on-call over the weekend, or grab on their way out the door, in the event of an evacuation of the facility. A sample jump kit is shown below: MIS Emergency Jump Kit Item Function Last Updated/ Tested Key to Data Center ID card Network Tap Access Control Unlocks Main Door to Facility Access to Backup Facility Provides access to Network Links where RADIUS or Router/Switch Access is unavailable. Software MS Windows OS for Servers 1-5 Redhat OS for Server for Eng. App. Enterprise Linux Oracle Database for R&D Group Database Software VOIP Determine delay/jitter Analysis Software Blank CDs Backup Data, or access to off-site backup data Network Tap Media Backups Used to recover systems Provides access to Network Links where RADIUS or Router/Switch Access is unavailable. Laptop (Patched) Tools Cables, Various MIS Emergency Jump Kit Item Function Last Updated/ Tested Analysis/Troubleshooting Remote Access (Analysis Tools Preloaded), Utility CD included, Dialup or remote account for internet access preloaded Tools to remove equipment from racks, open computer cases, remove cable, etc. (Flashlight Incl.) Used for Password Recovery, Server access, i.e. EIATIA568, Cross-over,T1 Documentation / Communication Communication/ Lists all Emergency Processes and Incident Forms Response/ Business Continuity/ Disaster Recovery s Paper/Pencil/ For notes, process etc Forms Practice with these tools on a variety of systems is increasingly important. Do not force your IT personnel to gather this data for the first time during a crisis. Practice using these tools and accessing different systems from a variety of locations, on a regular basis. The requirement to collect, review and analyze information across multiple systems has become complicated enough to require multiple skills, experience and abilities. The individuals reviewing the information may need to have a significant level of access to critical systems. This type of access is not usually held by a single individual in an organization. A designated backup should be available for each critical system. Specific problems result from the analysis of VOIP systems. A number of skill sets and tools are required to appropriately analyze a VOIP issue. If the server operates on a Windows or UNIX type operating system, skill sets with troubleshooting and analyzing that system are required. Specific log files, security patches and anti-virus updates must be completed and validated regularly. VOIP issues can be the result of network congestion, quality of service (QOS) configuration, network routing or security problems. Network analysis for VOIP is often done with clients or devices placed around the network to determine delay, latency and jitter. Access to these devices may require out of band access to ensure availability during network outages. The use of network taps to gather this information will guarantee that accurate timing is received by the analysis software and prevent dropped packets for security software. The use of taps eliminates the need to access network devices and configure port mirroring to gather data. Baseline information about your network and familiarity with analysis tools and access methods is necessary to provide accurate information during an event. Depending on the type of problem, forensic information, log files, backups or trace files may need to be collected and used for prosecution or best practices analysis. Chain of custody issues with this type of information needs to be understood and followed so that data is admissible in court, or valid for remediation or security 6 Developing an Incident Response Developing an Incident Response 7
5 Appropriate response Do not force your IT personnel to gather data for the first time during a crisis. enhancements in the future. Training for individuals that collect this data is highly recommended, and offered by several agencies. Determine/Conduct Response Once the problem has been identified and a damage assessment performed, per the DR plan, a response can be determined. An example of some responses and their associated actions are identified below: Response Action Approval Authority for Action Evacuate Facility Activate Hot Site CEO or Exec. VP Shutdown Process Activate Shutdown Procedure VP Operations or equivalent Gather Data Gather data about the system effected Director Level, Operations, IT or Security Isolate devices or effected areas Take systems offline; disable new logins; VP level or equivalent lockdown network segments Modify Systems Apply patches, security fixes, security updates, restore from backup VP MIS or VP responsible for the Application Note that Executive Approval is required for most actions. While obvious responses, like evacuating the facility in the case of a fire or bomb threat is obvious, the decision to activate the company s hot site, is a financial and business decision. If the main facility may be reoccupied in less than 24 hours, it may not make sense to activate the hot site, which is why this decision needs to occur at the highest levels. The IR plan is important, since it indicates the approval authority for each action and identifies appropriate responses. Evaluate Response After invoking the appropriate response, the effected systems and processes must be evaluated. If systems are still affected, more data collection, analysis and another response must be made. This is an ongoing action, and the key identifiers, logins, log files, cpu utilization, etc must be closely observed and recorded by the IR team. As a result of this analysis, another action, or the associated timeline with the recovery process may change. The IR teams role is to process this information and provide it back to the executive team, which may change the damage assessment. The damage assessment will determine other actions necessary in conjunction with timeframes, media coverage, utility responses, etc. Gather Evidence If the problem is eliminated, all information associated with the event is collected, stored, and reviewed to improve the overall IR process. If legal action is required, this information will be used as evidence. Evidence may need to be collected and stored on removable media, or on special purpose systems. Organization and presentation of the evidence should be organized and determined ahead of time, to permit faster analysis and recovery times. Any process centric approach needs to be maintained and updated on a regular basis. A best practices phase helps identify problem areas after an event, and allows appropriate groups and individuals to take corrective action. Item Yes/No Action Preparation Were there gaps in the IR preparation process? Was the documented process followed? Did the IR plan link appropriately with other documentation? Classification Was the event properly Classified? Were all attack vectors or system vulnerabilities identified to provide the team with the information to formulate an appropriate response? Data Collection Was appropriate data collected? Was any piece of data overlooked? Was the IR team properly equipped? Was the IR team properly trained? Did the IR team communicate effectively both internally and externally? Was data properly stored? Item Yes/No Action Determine/Conduct Response Was the appropriate response carried out in a timely manner? Was corrective action approved by an approved authority? Did the actions taken, contain the event or limit its spread to other systems? Evaluate Response Was the action evaluated? If the response did not solve issue, was new data collected to update the damage assessment? Gather Evidence Was all of the appropriate evidence gathered? Was evidence gathered appropriately to submit in a court of law? Was an IR process review conducted? Was an IR process review recommendation process updated as a result of the review? 8 Developing an Incident Response Developing an Incident Response 9
6 Best practices Emergency documents should be concise with defined goals. They should be written to accommodate a variety of issues. When using log files for evidence, timestamps are used to track packets through the network. Unfortunately, most network devices and servers clocks are not synchronized, which may make such evidence inadmissible in court. Using a network tap allows you to capture raw data without a network device timing or retiming the packet. Centralized storage devices can be used to save and protect historical network traffic for review at a later time. Review current forensics tools and methods frequently, and ensure that the IR staff is trained in collecting and storing this information. The companies legal department or local law enforcement agencies may have additional insight into forensics issues. A process review meeting is held to determine quality of the event procedures and processes, and where improvements can be made. Data and forms used during the entire process are valuable to review and analyze. Each action or communication should be recorded and time-stamped. This requirement often dictates that someone is available for note taking and communication, especially in large organizations or where multiple contractors may be involved, or where tracking software is unavailable. Schedule when recommendations and changes to the emergency management plans will be complete after an event. This ensures that the next event will be run more effectively. The importance of planning While our reliance on networked computer systems has increased, so has our susceptibility to outages. A comprehensive and process centric plan to work through these events is mandatory to maintain business resilience and customer confidence. Increasingly, government regulations require that businesses provide documentation related to Disaster Recovery and Business Continuity processes. Organization, planning and testing are the key elements to a worthwhile process centric system. Staff should train and test the processes regularly to confirm that each individual understands their specific roles and are capable of performing additional duties if required. Remediation and data collection tools and equipment should be tested and updated. A variety of open source tools are available to augment commercial software, since open source tools may not meet admissible data collection requirements for some courts. Emergency documents should be concise with defined goals. Detailed information that changes frequently should be consolidated in appendices or individual documents, which make them easier to update. Overall, plans should be generic and written to accommodate a variety of issues. Maintaining this process is challenging in today s fast-paced environment, but the savings on downtime, customer confidence and business resilience are worth the investment. 10 Developing an Incident Response Developing an Incident Response 11
7 DATACOM SYSTEMS INC Datacom Systems Inc. 9 Adler Drive East Syracuse, NY Enquiries US & Canada: Europe: +44 (0) Park Ave. 7th Floor (Suite 7072) New York, New York Datacom Systems Inc. UK 107 Cheapside London EC2V6DT Datacom Systems All rights reserved.
Deploying Network Taps for improved security
DATACOM SYSTEMS INC Deploying Network Taps for improved security A guide to improving security visibility A DATACOM SYSTEMS WHITE PAPER Improve Visibility A network security detection and prevention scheme
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Everything You Need to Know About Network Failover
Everything You Need to Know About Network Failover Worry-Proof Internet 2800 Campus Drive Suite 140 Plymouth, MN 55441 Phone (763) 694-9949 Toll Free (800) 669-6242 Overview Everything You Need to Know
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
Attachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
IT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
Security Policy for External Customers
1 Purpose Security Policy for This security policy outlines the requirements for external agencies to gain access to the City of Fort Worth radio system. It also specifies the equipment, configuration
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
The Importance of a Resilient DNS and DHCP Infrastructure
White Paper The Importance of a Resilient DNS and DHCP Infrastructure DNS and DHCP availability and integrity increase in importance with the business dependence on IT systems The Importance of DNS and
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service
NEWT Managed PBX A Secure VoIP Architecture Providing Carrier Grade Service This document describes the benefits of the NEWT Digital PBX solution with respect to features, hardware partners, architecture,
Offsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
CSIRT Introduction to Security Incident Handling
CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand
www.pwc.com How to effectively respond to an information security incident
www.pwc.com How to effectively respond to an information security incident Agenda Analogy Plan Preparation Incident Handling Overview Collect & Triage Investigation Containment Eradication Recovery 2 Are
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Empowering the Enterprise Through Unified Communications & Managed Services Solutions
Continuant Managed Services Empowering the Enterprise Through Unified Communications & Managed Services Solutions Making the transition from a legacy system to a Unified Communications environment can
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
CISM Certified Information Security Manager
CISM Certified Information Security Manager Firebrand Custom Designed Courseware Chapter 4 Information Security Incident Management Exam Relevance Ensure that the CISM candidate Establish an effective
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION
INNOVATE THROUGH MOTIVATION MSP Services Overview SVEN RADEMACHER Agenda About us IT Challenges Our Approach Our Services Next Steps About Us SEAFAIR IT SOLUTIONS Pre-eminent Managed Service Provider Provide
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Threat Management: Incident Handling. Incident Response Plan
In order to meet the requirements of VCCS Security Standards 13.1 Reporting Information Security Events, and 13.2 Management of Information Security Incidents, SVCC drafted an (IRP). Incident handling
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
OKHAHLAMBA LOCAL MUNICIPALITY
OKHAHLAMBA LOCAL MUNICIPALITY I.T DISASTER RECOVERY PLAN 2012/2013 TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 PURPOSE 2 1.2 OBJECTIVES 2 1.3 SCOPE 2 1.4 DISASTER RECOVERY STRATEGY 2 1.5 DISASTER DEFINITION
Operational Continuity
Solution Brief Operational Continuity Achieve Maximum Uptime In a recent speech, Omar Sherin of the Qatar CERT, shared how they shifted their focus from protection and detection to response in the wake
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Network Management and Monitoring Software
Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute
Service Level Agreement and Management By: Harris Kern s Enterprise Computing Institute Service Level Management Service Level Management deals with how user service requirements are understood and managed.
courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P
courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview Business Continuity, Disaster Recovery and Data Center Consolidation IT managers today must be ready for the
DISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
IBM QRadar Security Intelligence Platform appliances
IBM QRadar Security Intelligence Platform Comprehensive, state-of-the-art solutions providing next-generation security intelligence Highlights Get integrated log management, security information and event
Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:
Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery
Disaster Recovery Hosting Provider Selection Criteria
Disaster Recovery Hosting Provider Selection Criteria By, Solution Director 6/18/07 As more and more companies choose to use Disaster Recovery (DR), services the questions that keep coming up are What
ensurcloud Service Level Agreement (SLA)
ensurcloud Service Level Agreement (SLA) Table of Contents ensurcloud Service Level Agreement 1. Overview... 3 1.1. Definitions and abbreviations... 3 2. Duties and Responsibilities... 5 2.1. Scope and
IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.
IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite
Achieving Service Quality and Availability Using Cisco Unified Communications Management Suite EXECUTIVE SUMMARY CISCOLIVE Europe 2010 Annual Cisco IT and communications conference Event held at Barcelona,
Multi-layered Security Solutions for VoIP Protection
Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Request for Proposal Technology Services Maintenance and Support
Request for Proposal Technology Services Maintenance and Support Maintenance and Support July 19, 2014 Celerity Educational Group is seeking an IT consulting firm to manage Maintenance of our Network Systems
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology
Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
PREPARED FOR ABC CORPORATION
NETWORK DESIGN PROPOSAL PREPARED FOR ABC CORPORATION Prepared by Crystal Technologies PROPRIETARY AND CO NF IDE NTIAL Network Design Proposal PREPARED FOR ABC CORPORATION INC. ARTICLE I. OVERVIEW/HISTORY
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
AL RAFEE ENTERPRISES Solutions & Expertise.
AL RAFEE ENTERPRISES Solutions & Expertise. Virtualization Al Rafee has strategically made substantial investment in building up a large end to end portfolio of Virtualization across the entire IT infrastructure
CompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Network Computing Architects Inc. (NCA) Network Operations Center (NOC) Services
Network Computing Architects Inc. (NCA), provides outsourced IT services by monitoring and managing clients computing assets. Included Services: For all systems covered under NOC Support, the following
Security Controls Implementation Plan
GIAC Enterprises Security Controls Implementation Plan Group Discussion and Written Project John Hally, Erik Couture 08/07/2011 Table of Contents Executive Summary 3 Introduction 3 Security Controls Implementation
CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
Reducing Downtime Costs with Network-Based IPS
Reducing Downtime Costs with Network-Based IPS April 2007 900 East Hamilton Avenue Suite 230 San Jose California 95008 t 408.583.0011 f 408.583.0031 www.infonetics.com Silicon Valley, CA Boston, MA London,
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
HA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA
Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
Data Center Colocation - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Use of The Information Services Active Directory Service (AD) Code of Practice
Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Virtual Server Hosting Service Definition. SD021 v1.8 Issue Date 20 December 10
Virtual Server Hosting Service Definition SD021 v1.8 Issue Date 20 December 10 10 Service Overview Virtual Server Hosting is InTechnology s hosted managed service for virtual servers. Our virtualisation
