CSIRT Introduction to Security Incident Handling



Similar documents
IMS-ISA Incident Response Guideline

Security Policy for External Customers

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Information Security Incident Management Guidelines

Data Security Incident Response Plan. [Insert Organization Name]

Guideline on Incident Handling

Network & Information Security Policy

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

HIPAA Security Alert

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Threat Management: Incident Handling. Incident Response Plan

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Security Management. Keeping the IT Security Administrator Busy

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

INCIDENT RESPONSE CHECKLIST

Cyber Incident Management Planning Guide. For IIROC Dealer Members

Computer Security Incident Response Team

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Computer Security Incident Response Team

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Information Technology Policy

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Developing an Effective Incidence Response Plan

California State University, Chico. Information Security Incident Management Plan

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

DUUS Information Technology (IT) Incident Management Standard

IT Networking and Security

Completed. Document Name. NERC CIP Requirements CIP-002 Critical Cyber Asset Identification R1 Critical Asset Identifaction Method

Incident Reporting Guidelines for Constituents (Public)

Supplier Security Assessment Questionnaire

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

State of Oregon. State of Oregon 1

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

ensurcloud Service Level Agreement (SLA)

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

CISM Certified Information Security Manager

How to effectively respond to an information security incident

ISO COMPLIANCE WITH OBSERVEIT

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Information Shield Solution Matrix for CIP Security Standards

Security Controls Implementation Plan

IT Security Incident Management Policies and Practices

The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1

UCF Security Incident Response Plan High Level

IT Security Standard: Computing Devices

Recommended IP Telephony Architecture

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Disaster Recovery & Business Continuity Related, but NOT the Same! Teri Stokes, Ph.D., Director GXP International

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

FISMA / NIST REVISION 3 COMPLIANCE

Business Continuity Management

R345, Information Technology Resource Security 1

DDoS Overview and Incident Response Guide. July 2014

HIPAA RISK ASSESSMENT

Rulebook on Information Security Incident Management General Provisions Article 1

Technical Standards for Information Security Measures for the Central Government Computer Systems

Ohio Supercomputer Center

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

Ohio Supercomputer Center

Logging In: Auditing Cybersecurity in an Unsecure World

GEARS Cyber-Security Services

UF Risk IT Assessment Guidelines

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING

Managed Security Services for Data

The 5 Most Commonly Used Disaster Recovery Process

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

Cyber Incident Response

Eleventh Hour Security+

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

THE TOP 4 CONTROLS.

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Attachment A. Identification of Risks/Cybersecurity Governance

HIPAA Privacy & Security White Paper

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Information Security Incident Response

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Network and Security Controls

DANCERT RFC2350 Description Date: Dissemination Level:

CLOUD GUARD UNIFIED ENTERPRISE

Southern Law Center Law Center Policy #IT0014. Title: Privacy Expectations for SULC Computing Resources

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Transcription:

CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand the problems and you don t understand the technology - Bruce Schneier http://think.securityfirst.web.id/?page_id=12

References http://csrc.nist.gov/publications/nistpubs/800-61- rev1/sp800-61rev1.pdf

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Introduction Objectives of the module : Familiarize with computer security incident Arise awareness on preparation Give first hands on training on incident detection Present the complete lifecycle of incident handling Focus on : External relationships to management, constituency and communities Team internal measures to enhance level of quality in which the services are provided.

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Terminology Event any observable occurrence within a system or network. Adverse event an event which has a negative consequence. Security Incident - a violation or imminent threat of violation of IT security policies or standard security practices.

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Incident handling Handling incident several phases preparation: limit the number (and impacts) of incidents that will occur detection, registration, triage, assignment: security breaches, incident classification, signs of incidents containment, eradication, recovery: limit the spread, gather evidences, eliminate components, restore system to normal operation post incident activities: lessons learned, data collected

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Incident handling Preparation Preparation covers the three following groups of activities: Establishing incident response capability Making incident detection and analysis easy Preventing incidents

Incident handling Preparation Establishing incident response capability (1/3) Communications and Facilities Contact information (team members) On-call information Incident reporting mechanisms Pagers or cell phones Encryption software / digital signature War room Secure storage facility

Incident handling Preparation Establishing incident response capability (2/3) Analysis Hardware and Software Computer forensic workstations and/or backup devices Spare workstations, servers, and networking equipment Blank media, Removable media Laptops, Easily portable printer Packet sniffers and protocol analyzers Computer forensic software Evidence gathering accessories

Incident handling Preparation Establishing incident response capability (3/3) Analysis Resources Port lists Documentation Network diagrams and lists of critical assets Baselines Cryptographic hashes Mitigation Software Media Security patches Backup images

Incident handling Preparation Establishing incident response capability - Practice 4 groups : one group per task Tasks: Design a War room Design a Secure storage facility Enumerate tools for network diagrams and lists of critical assets

Incident handling Preparation Making incident detection and analysis easy (1/2) Profile networks and systems Study networks, systems, and applications to gain understanding of their normal behavior Practice: : Profile networks and systems Install OCS-Inventory agent, server and reports Update your data on the server Browse summaries on the server

Incident handling Preparation Making incident detection and analysis easy (2/2) Use centralized logging and create a log retention policy Keep all host clocks synchronized Maintain and use a knowledge base of information Use internet search engines for research Consider experience as being irreplaceable Create a diagnosis matrix for less experienced staff

Incident handling Preparation Preventing incidents Periodic risk assessments of systems and applications identify potential problems before they occur implement a genuine plan that clearly states how risks will be mitigated, transferred, avoided or accepted Recommended practices for securing networks: Patch management Host security Network security Malicious code prevention User awareness and training

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Incident handling From detection to assignment Incident report : Signs of an incident: events that trigger the process Sources of precursors and indications: software alerts, log files, publicly available information, etc Incident registration : in the incident handling system Incident triage : verification, classification, prioritization, assignment Incident notification

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Incident handling Containment, Eradication, and Recovery (1/3) Criteria for determining appropriate containment strategy Potential damage to and theft of resources Need for evidence preservation Service availability Time and resources needed to implement the strategy Effectiveness of the strategy Duration of the solution

Incident handling Containment, Eradication, and Recovery (2/3) Evidence gathering and handling To resolve the incident For legal proceedings Detailed log should be kept for all evidence, including: Identifying information (e.g., the location, serial number, model number, hostname, MAC address, IP address) Name, title, contacts of each individual who collected or handled the evidence during the investigation Time and date (including time zone) of each occurrence of evidence handling Locations where the evidence was stored

Incident handling Containment, Eradication, and Recovery (3/3) Eradication Deletion of components of the incident(malicious code, diverting a flood of DDoS attack to a sinkhole) Disabling or removing breached user accounts Recovery Actions are typically operating system (OS) or application-specific Restoration of systems to normal operation Hardening systems to prevent similar incidents

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Incident handling Post-incident activities (1/2) Lessons learned Exactly what happened, and at what times How well did staff and management perform? Were the documented procedures followed? Were they adequate? What information was needed sooner? Were any steps or actions taken that might have inhibited the recovery? What would the staff and management do differently the next time a similar incident occurs? What corrective actions can prevent similar incidents in the future? What additional tools or resources are needed to detect, analyze, and mitigate future incidents?

Incident handling Post-incident activities (2/2) Using Collected Incident Data Number of incidents handled Time per incident Objective assessment of each incident Subjective assessment of each incident Incident response audit to evaluate Incident response policies, plans, and procedures Team model and structure Incident handler training and education Tools and resources Incident documentation and reports, measures of success Evidence retention

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Enhancing quality of services (1/4) Good relations to the decision makers Proper funding, proper support Better perspective to develop the team further Using incidents as triggers for change, as opportunities to reflect on business as usual Constant awareness building referred to the added value derived from the services provided: Statistics about incidents Catastrophic scenario for the case if there were no CSIRT

Enhancing quality of services (2/4) Security-Related Information Dissemination reporting guidelines and contact information for the CSIRT archives of alerts, warnings, and other announcements documentation about current best practices general computer security guidance policies, procedures, and checklists patch development and distribution information vendor links current statistics and trends in incident reporting other information that can improve overall security practices

Enhancing quality of services (3/4) Communication channels Channels / media Print material Public Website Closed member area on the Website Mailing lists SMS /text messaging Video conferencing /VOIP Chat Contents Brochures, Flyers, Gadgets, Pencils, Stickers etc. should always include the essential incident reporting contacts Mission and goals as per constituency definition, Services, Contact details, Publicly available projects and papers For Secured information only displayed to constituents Way to address various target groups through different mailing lists In case of emergencies such as major infrastructure outages, good alternative for informing constituents that there is something going: urgently check email and/or contact the CSIRT Videoconferencing can add a more personal touch than voice alone Fast and efficient way for searching for help online Successful relationship is best initiated in person

Enhancing quality of services (4/4) Practice: Sending alerts to constituents You received this security news: Title:Bitcoin-Mining Trojan Lurking On Skype Date Published: 9th April 2013 URL:http://www.net-security.org/malware_news.php?id malware_news.php?id=2459 Practice: : Based on that report, draft an alert message to your constituents to inform them about the case provide them with advices on how they can enhance protection of their end users etc.

Contents Introduction: module objectives Incident handling Preparation Detection, registration, triage, assignment Containment, eradication, recovery Post incident activities Enhancing quality of services Conclusion

Conclusion (1/2) Some recommendations Prevent incidents from occurring by ensuring that networks, systems, and applications are sufficiently secure Profile networks and systems Understand normal behaviors of networks, systems, and applications Use centralized logging and create a log retention policy Acquire tools and resources for incident handling Establish strategies and procedures for containing incidents Establish mechanisms for outside parties to report incidents Prioritize incidents by business impact, based on criticality of affected resources and technical effect of incident Hold lessons learned meetings after major incidents

Conclusion (2/2) If you think technology can solve your security problems, then you don t understand the problems and you don t understand the technology - Bruce Schneier http://think.securityfirst.web.id/?page_id= id/?page_id=12 P. Jacques Houngbo jacques.houngbo@africacert.org