An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia
Agenda About MyCERT Where do incidents come from? Open Source Incident Handling Tool Conclusion Copyright 2008 CyberSecurity Malaysia 2
About MyCERT 1997 CyberSecurity Malaysia Malaysian Internet Users 15 staff Copyright 2008 CyberSecurity Malaysia 3
MyCERT s Services Cyber999 Cyber Early Warning Research National CERT & Global Emergency Co-ordination Copyright 2008 CyberSecurity Malaysia 4
Possible Services of CSIRT Reactive Proactive Security Quality Management Services Incident Handling Services Activities Activities Copyright 2008 CyberSecurity Malaysia 5
Where do incidents come from? External Parties CSIRT Internal Parties Copyright 2008 CyberSecurity Malaysia 6
Example of Incidents Defacement Host being used to send spam Host connected to a bot command & control Scanning activities from your network Etc Internal incidents Copyright 2008 CyberSecurity Malaysia 7
SOPs Standard Operating Procedures Different for different incidents Shows workflows and Response Time (SLAs) Copyright 2008 CyberSecurity Malaysia 8
Overview of MyCERT Incident Handling Process An Agency Under Complainant lodge Security incident Complainant lodge report to MyCERT via phone, fax, sms and email: cyber999@cybersecurity.org.my or mycert@mycert.org.my MOSTI Yes Yes 1 st level resolve issue? No 2 nd level resolve issue? Analyze the report and verify sufficient information is available to proceed Provide information and guide complainant in next course of action Ensure compliance to service level: Destructive or Criminal* incidents 24-48 hours Spam/harrassment next working day Follow up with complainant until case is closed Analyze artifacts, logs, intelligence gathering, etc Provide solution/advise/recommendation based on analysis conducted No Cooperate with external parties (ISP, Vendor, Law Enforcement) Cooperation in assisting complainant to lodge official reports with respective law enforcement. Assist law enforcement & ISPs in gathering and preserving evidence Escalate to vendor should assistance is needed in getting the solution or the case is vendor-related Close Feedback to complainant and close the case * Destructive/Criminal Incidents include: Intrusion, Denial of Service, Copyright large 2008 CyberSecurity Malaysia
Artefacts Handling Logs Binaries ETC Screenshots Copyright 2008 CyberSecurity Malaysia 10
The tool that you need Incident Management Tool Copyright 2008 CyberSecurity Malaysia 11
Requirements Unique ticketing, tracking Escalation more than one user Artifacts handling Secure communication Database of contacts Copyright 2008 CyberSecurity Malaysia 12
Open Source Options OTRS RTIR AIRT Copyright 2008 CyberSecurity Malaysia 13
Incident Reporting Channel Fax ETC Email OTRS IDS Phone Web SMS Copyright 2008 CyberSecurity Malaysia 14
OTRS Modules Incident tracking module Authoring tools for advisories Vulnerabilities database Artifact database Contacts database Ticket module WebWatcher Call module IDMEFConsole Copyright 2008 CyberSecurity Malaysia 15
Screenshots OTRS in Action Copyright 2008 CyberSecurity Malaysia 16
Conclusion People, Process, Technology makes up CSIRT You need tools to support incident handling activities Choosing the right tool for your work is important Copyright 2008 CyberSecurity Malaysia 17
Thank You! adli@cybersecurity.org.my Copyright 2008 CyberSecurity Malaysia 18