Incident Response Process
Based on Cybersecurity and Infrastructure Agency (CISA)
Last updated
Based on Cybersecurity and Infrastructure Agency (CISA)
Last updated
Used for incidents with confirmed malicious activities for which the incident has been declared or not ruled out.
Define a baseline for "normal" --> Identify deviations
Staffing plans --> Coordination Lead
Notification procedures
Infrastructure for classified & out-of-band communications (Escalation & Reporting)
Reporting to law enforcement
Contingency plans
Surge support & additional resourcing
Assign roles & responsibilities
Testing Procedures & Staff Readiness
DRP (Disaster recovery), BCP (Business Continuity), backup policies
Infrastructure diagram & Asset Inventory (Updated) --> Systems, networks, cloud platform, 3rd party hosted networks
Sensor monitoring & detection: AV, EDR, DLP, IDS, SIEM & PCAP captures
Monitor proactively intel feeds (gov, partners, vendors, open source) identify potential malicious activity
Threat landscape reporting
Threat actor profiles
Organizational threats & campaigns
Indicators:
Atomic: domains, IP address
Computed: YARA rules, regex that detect signs of malicious activity
Patterns & behaviors: TTPs (Tactics, Techniques, Procedures)
Atomic indicators good for detecting initial signs of campaign, but shelf life limited as adversaries change their infrastructure often
Recommended to use Patterns & behaviors (sustainable context) -- MITRE ATTACK Framework
redirect adversary to sandbox or honeynet --> delay adversary and study TTPs
Implement fake data objects (honeytokens) & fake accounts (canaries) for malicious activity
Transference to Padded cells
Segment SOC systems separately from enterprise IT systems
Sensors and security devices managed via out-of-band means
Phone notification system of compromise/incidents
Hardened workstations for monitoring and response activities
Robust backup & recovery processes
DO NOT submit malware samples/PII to public analysis services
Ticketing or Case management system
Determine extent, type and magnitude of compromise of the incident
Where the incident occurred: cloud, OT, hybrid, host and network systems
What was the initial attack vector? (i.e., How did the adversary gain initial access to the network?)
How is the adversary accessing the environment?
Is the adversary exploiting vulnerabilities to achieve access or privilege?
How is the adversary maintaining command and control?
Does the actor have persistence on the network or device?
What is the method of persistence (e.g., malware backdoor, webshell, legitimate credentials, remote tools, etc.)?
What accounts have been compromised and what privilege level (e.g., domain admin, local admin, user account, etc.)?
What method is being used for reconnaissance? (Discovering the reconnaissance method may provide an opportunity for detection and to determine possible intent.)
Is lateral movement suspected or known? How is lateral movement conducted (e.g., RDP, network shares, malware, etc.)?
Has data been exfiltrated and, if so, what kind and via what mechanism?
Extent of compromise:
Assets
Level of privilege attained by adversary
Operational impact
Discover the network data, host based artifacts --> Firewall, host, proxy, router traffic logs
Endpoint forensics analysis --> capture a memory and disk image for evidence preservation
Root cause & enabling conditions
Gather indicators of incident
Correlate events & Document timeline (logs) --> findings report during post-incident
Analyze how TTPs fit into the attack lifecycle --> why what and how
Technical objectives --> Mechanisms --> Steps and Tools
Prevent further damage and remove adversary access
Any impact to current operations, availibity of services, business operations
Duration of containment process, resources needed, extent of containment (Full, partial)
Impact on collection, preservation, documentation of evidence
Dilemma: To be complete in containment, ensure business continuity but avoid tipping off adversary/ allowing adversary to persist
Network Containment
Isolate impacted systems and network segments from each other and non impacted systems and networks
Update firewall filters
Block & Lock unauthorized accesses, malware
Scan for and Close specific unused ports and mail servers/others
Change sys admin & user passwords, rotate private keys & service/application account secrets --> revocate privileged access (where compromise is not ruled out)
Direct adversary to sandbox --> monitor activity, gather additionaly evidence, identify attack vectors
Business Continuity Planning (BCP)
Consider business needs and establish temporary services provisioning
Capture forensics images to preserve evidence (legal use)
Allow return to normal operations by eliminating the artifacts of the incident (Remove malicious code, re-image infected systems, reboot, backup)
Mitigation of the vulnerability or other conditions of exploit
Before doing any recovery efforts, ensure that:
All persistent access into network has been accounted for
Adversary activity contained
Forensics evidence collected
Remediate all infected IT environments (cloud, network, systems, OT, hybrid)
Re-image infecte systems (rebuild from scratch)
Rebuild hardware (if the compromise involves ROOTKITS)
Replace compromised files with clean versions
Install patches, check for updates
Monitor signs of adversary response during containment activites
Develop response scenarios for threat actor using possible alternative attack vectors
Continue detection and monitoring after ERADICATION --> if rediscovered, repeat containment, technical analysis --> until full scope of compromise confirmed.
Once no new adversary activity detected after set time, begin recovery phase:
Reconnect and rebuild systems to networks
Tighten perimeter security
Firewall rulesets
Boundary router ACLs
Zero trust access rules
Monitor for abnormal behaviors
Document incident, inform leadership, harden environments to prevent future incidents, apply lessons learnt for future trainings and policies
Identify and address blind spots
Emulate adversary TTPs to ensure counter measures in place are effective in detecting or mitigating the observed activities (Red team & Tuning team)
Provide post incident updates as required by Law & Higher management
review the efefctiveness and efficiency of incident handling
Initial root cause (Has it been eliminated?)
Problems faced executing the courses of actions (COAs)
Missing gaps in policies and procedures
Infrastrcture gaps in security
Review and update roles, responsibilities, interfaces and authority
Identify technical and operational training needs
Improving tools to perform detection, analysis and response