0% found this document useful (0 votes)
55 views

Automate Response: Did You Know?

This document provides an incident response playbook for responding to a data theft incident. It congratulates the recipient on selecting this resource and explains that the playbook will guide them through preparing for, detecting, analyzing, containing, eradicating, and recovering from a data theft. It also includes statistics about data breaches and their costs to emphasize the importance of incident response. The playbook is broken down according to the NIST framework and provides steps and considerations for responding to a data theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Automate Response: Did You Know?

This document provides an incident response playbook for responding to a data theft incident. It congratulates the recipient on selecting this resource and explains that the playbook will guide them through preparing for, detecting, analyzing, containing, eradicating, and recovering from a data theft. It also includes statistics about data breaches and their costs to emphasize the importance of incident response. The playbook is broken down according to the NIST framework and provides steps and considerations for responding to a data theft.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

INCIDENTRESPONSE.

COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
  

Automate Response Did you know?


Congratulations on selecting IncidentResponse.com to retrieve your custom incident response playbook
guide. This guide has been created especially for you for use in within your security response team. We In 2014, incidents increased by
hope you find it valuable and ask that you share it with the rest of your organization so you can collectively 78% since 2013.1
be successful in managing incidents and reducing risk throughout the business.

1,023,108,627 records were


breached in 2014.1
Your playbook overview - “Data Theft”
54% of the breaches consisted
of Identity Theft.1

Prepare Detect Analyze Contain Eradicate Recover Post-Incident


$3.5 million is the average
cost of a breach for a
company.2
Incident Response: A Top Priority in Security Management Programs
Companies experience an
In the April 2014, U.S. Government Accountability Office reported (GAO-14-354) it’s noted that “major average of 10 unauthorized
federal agencies did not consistently demonstrate that they are effectively responding to cyber incidents (a access incidents per month.2
security breach of a computerized system and information).” The GAO projects that these agencies did not
Malicious insiders and
completely document actions taken in response to detected incidents. While the agencies identified the
criminal attacks are the top
scope of an incident, they frequently did not demonstrate that they had determined the impact of an
causes for breaches.2
incident, nor did they consistently demonstrate how they had handled other key activities, such as whether
preventive actions to prevent the reoccurrence of an incident were taken. The GAO notes, “without com-
plete policies, plans, and procedures, along with appropriate oversight of response activities, agencies
1. Source: Gemalto - Breach Level Index
face reduced assurance that they can effectively respond to cyber incidents.” 3 2. Source: Ponemon 2014 Cost of a Data Breach
3. Source: GAO-14-354, p.2

-1-

PRESENTED BY
To learn more about playbooks and incident response, visit IncidentResponse.com
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
  

What is an incident response playbook? According to NIST Special Publication 800-61, an incident response process contains four main phases: preparation,
detection and analysis, containment/eradication/reocvery, and post-incident activity. Descriptions for each are included below:

Prepare Detect & Analyze Contain, Eradicate Post-Incident Handling


& Recover
The initial phase where organizations The second phased where Because the handling of malware
will perform preparatory measures to organizations should strive to detect The third phase, containment, has incidents can be extremely
ensure that they can responsd and validate incidents two major components: stopping the expensive, it is particularly important
effectively to incidents if and when rapidly because infections can spread of the attack and preventing for organizations to conduct a robust
they are uncovered. spread through an organization further damage to systems. It is assessment of lessons learned after
within a matter of minutes. Early important for an organization to major malware incidents to prevent
detection can help an organization decide which methods of similar incidents from occurring.
minimize the number of infected containment to employ early in the
systems, which will lessen the response. Organizations should have
magnitude of the recovery effort and strategies and procedures in place
the amount of damage the for making containment-related
organization sustains as a result of decisions that reflect the level of risk
the incident. acceptable to the organization.

Data Theft
You’ve selected the “Data Theft” playbook. On the pages that follow, you will find your incident response
playbook details broken down by the NIST incident handling categories.

To view your playbook online, visit https://incidentresponse.com/playbooks/data-theft

-2-

PRESENTED BY
To learn more about playbooks and incident response, visit IncidentResponse.com
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
P R E PA R E - D ATA T H E F T

Determine Core
Ops Team Vulnerability Threat Risk
Manager Manager Manager
& Define Roles

Review &
Maintain Timeline

Interviews Physical Key


User Manager
Security Stakeholders

Document Internal Path External Path Document

Next
Step

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
D E T E C T - D ATA T H E F T

Prev
Step

Emails returned as Identification or Large data dumps of


Undeliverable due publication of databases, network
to size limitations proprietary information shares or other
outside the organization computer systems

Local disk or network Notification of extortion Define


shares that are near full in order to recover Standard Threat Custom Custom Indicators
capacity stolen data Indicators

Reporting of large Work performed


emails being sent by outside of normal
a single user business hours Categorize
Incident

Reports of removable
and/or mobile devices
being used to copy data Request Packet
Capture

Conduct Scans

Next
Step

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
A N A LY Z E - D ATA T H E F T

Prev
Step

Stolen data damaging to External user PII or


Internal user PII or other
business operations or other protected
protected information
brand of the information has
has been stolen
organization been stolen

PII or other protected Compliance regulations


information has been have been violated Standard Define Risk
Factors
Custom Custom Factors
compromised

Products/goods
Public or personnel Customers are affected
/services are affected by
safety affected by this incident Determine Patch
this attack
Methods

Ability to control /
record/measure/track There is indication of There is internal
any significant amounts who performed the data knowledge of this
of inventory/products / theft incident Log Collection
cash/revenue is lost

There is external Identify worst-case Identify business


knowledge business impact if operations that may be
of this incident unable to mitigate this affected and identify
Evidence Collection
attack any alternate courses

Identify business Identify additional Determine risk of the


implications of the Data technical implications stolen data being
Theft of the Data Theft released to the public Data Capture

Analysis

Next
Step

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
C O N TA I N - D ATA T H E F T

Prev Identify the system(s)


Servers Desktop Laptop Mobile VM LDAP
Step that have been affected Directory

Identify user credentials


compromised
or at risk

Identify method used


to steal data

Identify systems used


to steal data
Incident Threat
Database Database

Identify any source Vulnerability System


attribution collected Select Database Query Database Generate Report
Logs Logs

Identify lateral movement of


compromised users View Report View Record Details Select Records Copy Record Details
throughout enterprise

Identify the tools used Removable


to detect the attack SIEM IDS Firewall Scanners Antivirus Device Monitors

Next
Step

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
E R A D I C AT E - D ATA T H E F T

Prev
Step

Triage & Confirm Request System Contain malicious


Test Code
Incident Report Patch Code Sample

Direct Conference
Phone Call Call

In-Person Intranet
Meeting Meeting
Communications

Mobile Internet
Messaging Meeting

Add/Change/ Determine method of


Eradicate Malware Remove Affected
Perform data
forensics
removing data from
the organizations
System/Site/Network
enterprise network

Monitor network Create alert


signatures for
Prepare to
temporarily scan or Implement device
traffic for ongoing suspected data block all outbound
data more than ___
control monitoring
and control systems
theft exfiltration Mb in size

Next
Step

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
R E C O V E R - D ATA T H E F T

Prev
Step

Identify ways to
Recover Systems Reimage IDS/IPS &
Firewall Updates
mitigate further
removal of data

Coordinate AV
Incident Wipe & Baseline
Scan host with Scan File Share Remove updates to be
updated with updated Vulnerabilities & pushed upon
Remediation System
Signature Signature Update Routers release from AV
Vendor

Next
Step

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
P O S T- I N C I D E N T - D ATA T H E F T

Prev
Step

Sensitive
Electronic Personal
Incident Review Health Information
Government
Information
(ePHI) Compromised?
Compromised?

Discovery Policy Updates Process Updates Configuration


Lessons Uncovered Meeting Defined Defined Updates Defined

Policies Process Changes Configurations


Lessons Applied Implemented Implemented Applied

Response Workflow
Updated

INCIDENTRESPONSE.COM
  
INCIDENTRESPONSE.COM
ON L I N E I N C I D E N T R E S P ON S E CO M M U N I T Y
  

Proactive Response Security Management Benefits


An automated playbook helps security teams optimize for efficiency and productivity. Your security team has the
• Be prepared to handle any incident your
ability to analyze, detect and prioritize when all pertinent data and multiple security tools are integrated into one
team faces
system. With one-screen visibility you can identify anomalies, assign tasks, access reporting and communicate
• Control the situation, minimizing the
across multiple departments effectively for quick responses.
impact to the business
• Efficiently manage your response across
Quick Containment multiple departments
Time and speed are crucial in assessing the environment and risk in the context of your business. Playbooks give a
complete view of the necessary tasks to capture the data needed to support proper recovery and forensics. The
Useful Links:
efficiency a playbook brings to a security team allows for quick responses to finding the source of the attack,
NIST Incident Handling Guide
following lateral movement across the organization and taking the proper steps mitigate damage.
SANS Incident Handler’s Handbook

Effective Remediation
Organization and automation are key benefits that result in effective remediation. Automated playbooks help to Risk Management Benefits
organize security processes, mitigation plans and smooth communication between multiple departments. By • Communicate effectively to ensure risk
optimizing data collection, analysis, and communications you improve the odds for effective eradication, recovery mitigation methods are applied
with integrity and forensic-quality reporting. • Prioritize resources and activities where
they matter most
• Report and tune based on response
Action Plan learning, reducing risk moving forward

Having a view into what is possible is the first step in taking action. The next step is to bring your team together to
drive it toward reality. Email this guide to your peers and managers to begin sharing your playbook with them. Useful Links:
NIST Risk Management Framework Guide
With this playbook, you will be better prepared to handle the response. To help with the management and automation
Sample Policies and Plans
of this incident response playbook, consider working with CyberSponse and their partners. Come take a look at what
they do.

For additional incident response playbook examples, visit https://www.incidentresponse.com/playbooks

- 10 -

PRESENTED BY
To learn more about playbooks and incident response, visit IncidentResponse.com

You might also like