IRPLAN
IRPLAN
1
CYBERSECURITY INCIDENT RESPONSE PLAN
SYNOPSIS
A cybersecurity incident response plan (IRP) to help responders with the tactical aspects of incident response.
SCOPE
This document applies to all individuals (Personnel) responsible or involved with cybersecurity incident response
activities. Personnel shall be informed of this document by the organization’s Information Security Office or Officer(s)
(ISO).
This document is designated as Traffic Light Protocol (TLP): AMBER. Recipients may share TLP: AMBER
information with members of their organization who need to know, and only widely as necessary to act on that
information.
This document contains confidential and privileged material. Any interception, review, retransmission, dissemination
or other use of or taking any action upon this information by persons or entities other than the intended recipient(s)
is prohibited by law and may subject them to criminal or civil liability. This document contains material that may
have been commissioned by counsel in anticipation of litigation. It should be treated as confidential to avoid waiver
of the attorney/client privilege, the work-product privilege, or another applicable privilege. It was prepared for the
sole use of the named recipient, and must not be relied upon by any third party.
This document is a deliverable that meets or exceeds a standard of reasonable cybersecurity practices.
This document meets or exceeds the following standards, compliance and/or regulatory requirements:
Standards:
1. NIST Special Publication 800-61
2. NIST Cybersecurity Framework (CSF)
Compliance:
1. ISO 27001 – A.16
2. PCI DSS 3 – 10, 12.9
Regulation:
1. EU GDPR – Article 33, 34
2. CA CCPA - Standard of Reasonable Cybersecurity - Incident Response Plan
DESCRIPTION
Prologue
Taxonomy
Cybersecurity
The words cybersecurity and security are synonymous and used interchangeably herein.
Cybersecurity is the state of being protected against the violation of computer security policies, acceptable use policies,
or standard security practices, or the measures taken to achieve this.
Asset
The words asset, information asset, information technology resource, and other processing activities are synonymous
and used interchangeably herein.
2
Figure 1:
Event
An event is an observable occurrence in a digital ecosystem or computer network. Event examples include a login,
a user connecting to a file share, a server receiving a request for a web page, a user sending email, and a firewall
blocking a connection attempt.
Alert
The words alert and alarm are synonymous and used interchangeably herein.
An alert is an event having a security context usually generated from threat detection assets or treat hunting routines.
Alerts may be the result of a negative consequence and generally require subsequent inspection. Examples of alerts
include system crashes, unauthorized use of system privileges, unauthorized access to sensitive data, execution of
malware, and destruction of data.
Incident
The word incident and the term event of critical interest are synonymous and used interchangeably herein.
An incident is an event or alert that signifies a security control failure, or a violation, or imminent threat of violation
of computer security policies, acceptable use policies, or standard security practices that require critical triage and a
more in-depth investigation known as incident response.
During disciplined cybersecurity operations, including investigating and analyzing alerts, it is common for information
security professionals to label the resulting analysis in terms of risk of compromise. An incident, or event of critical
interest, is an analysis that results in a declaration of real or imminent danger and significant risk of asset
compromise or confirmation thereof.
As an example, take two classes of typical cybersecurity events: potentially unwanted program and ransomware. The
latter, ransomware, represents an event of critical interest because its progression through the environment represents
real and imminent danger and could result in a significant risk of compromise to critical assets.
Another example may be an individual receiving a phishing email and realizing that it has attached malware,
is in of itself NOT an incident (detective controls worked). However, an individual downloading that attached
malware IS possibly an incident (preventative or corrective controls did not work) dependent on subsequent control
failures (defense-in-depth failures) or real or imminent danger and significant risk of asset compromise or
confirmation thereof.
An analogy in the natural world might be the comparison of a misdemeanor vehicular moving violation to a felony
armed robbery. The latter, armed robbery, would be considered an incident.
3
Instruction
Implementers of this IRP use a PICERL model as guidance for organizing courses of action (COA):
1. Preparation
2. Identification
3. Containment
4. Eradication
5. Recovery
6. Lessons / Opportunities For Improvement
Implementers of this IRP use an OODA loop as guidance for conducting COA:
1. Observe
2. Orient
3. Decide
4. Act
Preparation
Roles
1. ISO
1. The Information Security Office or Officer(s) or designated representative(s) shall be responsible for ensuring
the strategic effectiveness of this IRP.
2. CSIRT
1. The Computer Security Incident Response Team or designated representative(s) shall be responsible for
ensuring the tactical effectiveness of this IRP.
Risk Management
The ISO shall be responsible for establishing risk management strategies that meet or exceed a standard of reasonable
cybersecurity practices. These activities protect information assets, controls, and processes against a violation of the
organization’s computer security policies or acceptable use policies. The ISO is responsible for establishing controls
and processes aligned with the five (5) core functions of Cybersecurity Risk Management as defined by the NIST
Cybersecurity Framework (CSF).
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
Severity Ratings
This IRP uses the priority levels defined in the US National Cybersecurity and Communications Integration Center
(NCCIC) Cyber Incident Scoring System (CISS) as the model for rating the severity of an Information Security
Incident. SEE NCCIC CISS Severity Rating Model
4
Severity rating levels shall be used to determine the necessary force and resource prioritization required to handle and
respond to an incident. The CSIRT is responsible for declaring the initial severity rating. The ISO is responsible
confirming and adjusting security ratings that meet or exceed a High rating.
Log Retention
The ISO shall be responsible for ensuring that log data transmitted by assets is properly preserved, protected, and
maintained for a period of one (1) year.
Restoring Operations
The ISO shall certify that assets impacted by a successful compromise are eligible for being restored to their normal
operational state only after remediation activities have prevented the assets from further risk of intrusion.
After-Action Report
The CSIRT shall produce an after-action report that provides the details of the incident. The CSIRT should produce
content for the report iteratively during the response. The ISO shall approve all dissemination of the report.
SEE Mission Model Report
5
The ISO shall be responsible for coordinating and delivering notifications, without undue delay, to individuals,
customers, and data subjects for the purposes of complying with statutes, regulations, or ordinances if the ISO
determines the incident is likely to result in an infringement of, or high risk to, the rights and freedoms of those
individuals, customers, and data subjects that have been impacted by the compromised assets.
Controller & Supervisory Authority Notifications (EU GDPR 33)
The ISO shall be responsible for coordinating and delivering notifications, within seventy two (72) hours of identifying
an incident, to the supervisory authority (when organization is acting as a controller) or the controller (when
organization is acting as a processor) for the purposes of compliance with the EU GDPR regulation if the ISO
determines the incident is likely to result in an infringement of, or high risk to, the rights and freedoms of those
individuals, customers, and data subjects that have been impacted by the compromised assets and/or information
technology resources.
US State Authority Notifications
The ISO shall be responsible for coordinating and delivering notifications, without undue delay, to various state
authorities (SEE here and here) for the purposes of complying with statutes, regulation, or ordinances if the ISO
determines the Information Security Incident is likely to result in an infringement of, or high risk to, the rights and
freedoms of those individuals, customers, and data subjects that have been impacted by the compromised assets
and/or information technology resources.
Law Enforcement
The ISO shall be responsible for notifying law enforcement to comply with statutes, regulation, or ordinances or
threat actor prosecution if the ISO determines the incident meets the standard of a condition identified through
discussions with law enforcement representatives provided such discussions have previously taken place. The ISO shall
refrain from contacting multiple agencies when reporting an incident to avoid jurisdictional conflicts. The following is
a list of law enforcement agencies:
1. Federal Bureau of Investigation
2. U.S. Secret Service
3. District Attorney
4. State Attorney General
Media
The ISO shall be responsible for coordinating and sharing the relevant details of an incident, without undue delay on
a need to know basis, with the media when the ISO deems that sharing is beneficial to response activities and per the
organization’s data classification policies.
External Service Providers
The ISO shall be responsible for coordinating and sharing the relevant details of an incident, without undue delay on
a need to know basis, with the organization’s trusted 3rd party service providers when the ISO deems that sharing is
beneficial to response activities and per the organization’s data classification policies.
1. Cybersecurity-as-a-Service Providers
2. Incident Response Partners
3. Legal Counsel
4. Crisis Management Partners
5. Cybersecurity Insurance Broker
Response Practice
1. Use real world IOC-Negative scenarios as if they were IOC-Positive to train response personnel and gauge
response effectiveness
2. Become Familiar With Breach Notification Laws
3. Security Breach Notification Laws
Identification
6
Assess & Rate
1. Breathe
2. Think “smooth is fast”
3. Inspect change logs to determine if activity is possibly the result of an authorized change
4. Review system baselines to determine if activity is possibly the result of expected behavior
5. Ask asset owners what they know in terms of Indicators Of Compromise (IOC) and record the results
1. SEE Top Indicators of Compromise (TOP-IOC) below for hints
2. SEE MITRE ATT&CK Framework for hints
6. Ask asset owners “Was there a loss of data?” and record the results
7. Ask asset owners “Was restricted data at risk?” and record the results
8. Assign a severity rating
1. SEE NCCIC CISS Severity Rating Model
Collect
IMPORTANT - Keep a system POWERED ON prior to the collection of volatile media to preserve
valuable evidence (isolate the host by disconnecting its network connection or through the use of EDR)
1. Journal collection activities
2. Conduct log analysis
3. Conduct system forensics
1. Use a DFIR checklist
2. Acquire volatile media
3. Acquire non-volatile media
Store
1. Follow a consistent evidence process that achieves the objective of provenance
2. Journal evidence activities
3. Establish an evidence locker
4. Preserve evidence
Contain
CONTAINMENT IS THE MOST IMPORTANT COA DURING INCIDENT RESPONSE
1. Create a list of COA based on the nature of the threat
2. Use the OODA loop method as guidance for COA
3. Organize the COA by using the mnemonic: Inventory + 6-Ds
7
1. Inventory
2. Detect
3. Deny
4. Disrupt
5. Degrade
6. Deceive
7. Destroy
4. Force rank COA based on strategies that:
1. Mitigate risk
2. Create an advantage for the responders
3. Preserve evidence
4. Consider collateral damage
5. Align with policies
6. Respect the law
5. Use the properly maintained cyber weapons to fortify the Inventory + 6-Ds
6. Apply defensive and offensive force concentration tactics
1. *NOTE: Force concentration does not guarantee relief from a flank of routine threat activity: watch the
wire!
2. *NOTE: Force concentration is useless if containment assets are idle: assign COA & put weapons to
use
7. Manage fatigue to avoid defective decision making and maintain consistent pressure on the adversary
8. Avoid decision avoidance, solve the problem, embrace the challenge, and be fast-acting
9. Get in the fight and regain control of the impacted assets!
Eradicate / Remediate
1. Inspect the asset to ensure the threat has been fully eradicated
2. Remediate all known vulnerabilities
3. Apply controls to prevent further intrusion
Recover / Restore
IMPORTANT - Restore only after remediation activities have prevented the assets from further risk
of intrusion
1. Restore to a normal state
1. Recovery point objective (RPO)
2. Recovery time objective (RTO)
After-Action Report
SEE Mission Model Report
1. Develop content for the report in an iterative manner as response activities are being conducted
2. Supply detailed and factual statements and artifacts
1. Summary
2. Timelines (attack & response sequences)
3. Indicators of Compromise (IOC) (the nouns of the attack)
8
4. Intrusion Kill Chain (IKC) (threat actors activity - bad guy verbs)
5. Courses of Action (COA) (reponders activity - good guy verbs)
6. Opportunities for Improvement (OFI) (lessons learned)
3. Disseminate the report
EXAMPLES
# IOC NEGATIVE
## TOP-IOC: Attack surface DOES NOT exist
## TOP-IOC: Attack surface vulnerability DOES NOT exist
## TOP-IOC: Mitigating controls DO EXIST and ARE currently protecting the asset
## TOP-IOC: Subsequent attack activity DOES NOT exist
## TOP-IOC: Corroboration from other assets DOES NOT exist
## TOP-IOC: NOT CONSISTENT with unusual egress network traffic
## TOP-IOC: NOT CONSISTENT with unusual lateral movement
## TOP-IOC: NOT CONSISTENT with login anomalies
## TOP-IOC: NOT CONSISTENT with suspicious domain controller activity
## TOP-IOC: NOT CONSISTENT with suspicious byte counts
----
# IOC POSITIVE
## TOP-IOC: Attack surface DOES exist
## TOP-IOC: Attack surface vulnerability DOES exist
## TOP-IOC: Mitigating controls DO NOT EXIST or ARE NOT currently protecting the asset
## TOP-IOC: Subsequent attack activity DOES exist
## TOP-IOC: Corroboration from other assets DOES NOT exist
## TOP-IOC: CONSISTENT with unusual egress network traffic
## TOP-IOC: CONSISTENT with unusual lateral movement
## TOP-IOC: CONSISTENT with login anomalies
## TOP-IOC: CONSISTENT with suspicious domain controller activity
## TOP-IOC: CONSISTENT with suspicious byte counts
9
NOTES
General TOP-IOC
1. Attack Surface Vulnerability Exists
2. Corroboration From Multiple Intelligence Assets
3. Unusual Egress Network Traffic
4. Unusual Ingress Network Traffic
5. Anomalies In Privileged User Account Activity
6. Geographical Irregularities
7. Log-In Anomalies
8. Volume Increase For Database Reads
9. HTTP Response Size Anomalies
10. Large Numbers Of Requests For The Same File
11. Mismatched Port-Application Traffic
12. Suspicious Registry Or System File Changes
13. DNS Request Anomalies
14. Unexpected Patching Of Systems
15. Mobile Device Profile Changes
16. Data In The Wrong Places
17. Unusual Lateral Movement
18. Velocity Increase For Share / Mount Activity
19. Time Based Anomalies
20. Suspicious Byte Counts
21. Suspicious Domain Controller Activity
22. Subsequent Activity By Attacker Address / GEO
23. HTTP Response Code Success
10
18. Dark Outbound Network Connections
19. Known Command And Control Connections
20. Building Entry And Exits
21. High Volume Printing Activity
22. Unusual Time Period Printing
23. Endpoint Indicators Of Compromise
24. Sensitive Table Access
25. Sensitive Data Movement Combined With Other Risk Indicators
11
Protecting Against Phishing
1. Conduct security awareness training
2. Conduct phishing simulation tests
3. Deploy Application Whitelisting (AWL)
4. Deploy Endpoint Detection and Response (EDR) technology
5. Inspect outbound URLs
6. Ensure user accounts do not execute with elevated (admin) privileges
7. Use inbound email sandboxing
8. Deploy packet capture inspection technology with decryption capability
9. Deploy HTTPS inspection technology that validates certificate chains
SEE ALSO
1. https://github.com/guardsight/gsvsoc_mission-model
2. https://www.nist.gov/cyberframework
3. http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf
4. https://nvd.nist.gov/800-53/Rev4/control/IR-8
5. https://nvd.nist.gov/800-53/Rev4/family/INCIDENT%20RESPONSE
6. https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
7. https://www.us-cert.gov/NCCIC-Cyber-Incident-Scoring-System
8. https://www.eugdpr.org/
9. http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-
laws.aspx
10. https://www.bakerlaw.com/files/Uploads/Documents/Data%20Breach%20documents/Data_Breach_Charts.pdf
11. https://attack.mitre.org
12. https://zeltser.com/cheat-sheets
Figure 2:
GuardSight® is a registered trademark of GuardSight, Inc. All other products and company names mentioned herein
are trademarks or registered trademarks of their respective owners. © GuardSight, Inc.
12