Lecture 06 - Incident Management and SOC
Lecture 06 - Incident Management and SOC
• Resistance to change
Standards and Guidelines
• The ISO/IEC 27001 Standard
• The ISO/IEC 27002 Standard
• ISO/IEC 27035 Standard
• The ITIL Framework
• NIST Special Publication (NIST SP 800-61)
• ENISA - Good Practice Guide for Incident
Management
• NorSIS - Guideline for Incident Management
• SANS: Incident Handler’s Handbook
Incident Management, Incident Handling and
Incident Response
Incident handling
• Detecting and reporting – the ability to receive and review event
information, incident reports, and alerts
• Triage – the actions taken to categorize, prioritize, and assign events and
incidents
• Analysis – the attempt to determine what has happened, what impact,
threat, or damage has resulted, and what recovery or mitigation steps
should be followed. This can include characterizing new threats that may
impact the infrastructure.
• Incident response – the actions taken to resolve or mitigate an incident,
coordinate and disseminate information, and implement follow-up
strategies to prevent the incident from happening again
Best Practices for Building an Incident
Response Plan
• Incident Response Plans are written and documented.
• Continuously monitors the • Performs deep-dive incident • In-depth knowledge • Manages resources to
alert queue analysis by correlating data network, endpoint, threat include personnel, budget,
from various sources intelligence, forensics & shift scheduling and
• Triages security alerts
malware reverse technology strategy to meet
monitors health of security • Determines if a critical
engineering, Specific SLAs
sensors and endpoints system or data set has been
applications or underlying IT
impact • Communicates with
• Collects data and context infrastructure
management
necessary to initiate Tier 2 • Advises on remediation • Acts as an incident “hunter,”
work provides support for new • Serves as organizational
not waiting for escalated
analytic methods for SPOC for business-critical
incidents
detecting threats incidents
• closely involved in
• Provides overall direction for
developing, tuning &
the SOC and input to the
implementing threat
overall security strategy
detection analytics.
KPIs for SOC