FALLSEM2024-25 CSE3501 ETH VL2024250103022 2024-09-13 Reference-Material-I
FALLSEM2024-25 CSE3501 ETH VL2024250103022 2024-09-13 Reference-Material-I
Audit
Module 5 Incident Management and Response
www.nadeshrk.webs.com
Incident Response
• An incident is a set of one or more security events or
conditions that requires action and closure in order to
maintain an acceptable risk profile.
www.nadeshrk.webs.com
Definition
• Incident management is the capability to effectively manage
unexpected disruptive events with the objective of minimizing
impacts and maintaining or restoring normal operations
within defined time limits
www.nadeshrk.webs.com
Incident Types
www.nadeshrk.webs.com
Incident
• Malicious code
• Network reconnaissance
• Unauthorized access
• Inappropriate usage
• Multiple component
www.nadeshrk.webs.com
Impact of information
security incidents:
• Functional impact (current and likely future negative
impact to business functions)
www.nadeshrk.webs.com
Need for incident
response
• to respond quickly and effectively when security breaches
occur.
• to help deal properly with legal issues that may arise during
incidents.
www.nadeshrk.webs.com
How to identify an
•
incident
incident analysis hardware and software to identify an incident.
www.nadeshrk.webs.com
Signs of security incident
• web server log entries that show the usage of a vulnerability scanner.
server.
• network intrusion detection sensor alerts when a buffer overflow attempt occurs against a
database server.
• antivirus software alerts when it detects that a host is infected with malware.
• application logs multiple failed login attempts from an unfamiliar remote system.
• email administrator sees a large number of bounced emails with suspicious content.
• Network administrator notices an unusual deviation from typical network traffic flows.
www.nadeshrk.webs.com
Steps for Incident Handling Process
• Identification
• Incident recording
• Initial response
• Communicating the incident
• Containment
• Formulating a incident response strategy
• Incident classification
• Incident investigation
• Data collection
• Forensic analysis
• Evidence protection
• Notify external agencies
• Eradication
• System recovery
• Incident documentation
• Incident damage and cost analysis
• Review and update the response policies
• Training awareness
www.nadeshrk.webs.com
Step 1: Identification
• Obtaining and validating information related to information security issues
• Common issues and incidents of information security that may require action and whom to report
www.nadeshrk.webs.com
Step 2: Incident recording
• Any occurrences of incident must be recorded and
the incident response team should update the
status of incidents along with other pertinent
information.
www.nadeshrk.webs.com
Incident record template
• Current status of the incident as new, in progress, forwarded for
investigation, resolved etc.
• Summary of the incident
• Indicators related to the incident
• Other incidents related to this incident
• Actions taken by all incident handlers on this incident
Chain of custody, if applicable
• Impact assessments related to the incident
• Contact information for other involved parties (system owners,
system administrators etc.)
• List of evidence gathered during the incident investigation
• Comments from incident handlers
• Next steps to be taken (rebuild the host, upgrade an application
etc.)
www.nadeshrk.webs.com
Step 3: Initial response
• Commence initial response to an incident based on
the type of incident, the criticality of the resources
and data that are affected, the severity of the
incident, existing Service Level Agreements (SLA) for
affected resources, the time and day of the week,
and other incidents that the team is handling.
www.nadeshrk.webs.com
Step 4: Communicating the incident
www.nadeshrk.webs.com
Step 5: Containment
Containment and Quarantine
www.nadeshrk.webs.com
Various containment
strategies
• Potential damage to and theft of resources
• Need for evidence preservation
• Service availability (network connectivity, services
provided to external parties etc.)
• Time and resources needed to implement the strategy
• Effectiveness of the strategy (partial containment, full
containment etc.)
• Duration of the solution (emergency workaround to be
removed in four hours, temporary workaround to be
removed in two weeks, permanent solution etc.)
www.nadeshrk.webs.com
Quarantine
• Handling an incident may necessitate the use of
strategies to contain the existing predicament and
one such method being redirecting the attacker to
a sandbox (a form of containment) so that they
can monitor the attacker’s activity, usually to
gather additional evidence.
• An incident with a high functional impact and low effort to recover from
is an ideal candidate for immediate action from the team.
www.nadeshrk.webs.com
Step 7: Incident
classification
• Classifying and prioritizing information
security incidents
• An incident may be broadly classified based on common attack vectors such as
external/ removable media; attrition; web; email; improper usage; loss or
theft of equipment; miscellaneous.
www.nadeshrk.webs.com
Step 8: Incident
investigation
• One of the key tasks of an incident response
team is to receive information on possible
incidents, investigate them, and take action to
ensure that the damage caused by the
incidents is minimized.
• Following up an incident investigation
• Lessons learnt from security incident
• Process change for the future
• Incident record keeping
www.nadeshrk.webs.com
Step 9: Data collection
• Evidences collected should be accounted for at all times whenever evidence is
transferred from person to person, chain of custody forms should detail the transfer
and include each party’s signature.
• A detailed log should be kept for all evidence, including the following:
• Identifying information (e.g. the location, serial number, model number, hostname,
media access control (MAC) addresses and IP addresses of a computer).
• Name, title, and phone number of each individual who collected or handled the
evidence during the investigation.
• Time and date (including time zone) of each occurrence of evidence handling.
www.nadeshrk.webs.com
Step 10: Forensic
analysis
• Therefore, it is appropriate to obtain snapshots through full
forensic disk images, not file system backups.
www.nadeshrk.webs.com
Step 11: Evidence
protection
• It is generally desirable to acquire evidence from a system
of interest as soon as one suspects that an incident may
have occurred.
www.nadeshrk.webs.com
Step 12: Notify external agencies
www.nadeshrk.webs.com
Step 14: Systems recovery
• In recovery, administrators restore systems to normal operation,
confirm that the systems are functioning normally, and (if
applicable) remediate vulnerabilities to prevent similar incidents.
www.nadeshrk.webs.com
Step 15: Incident
documentation
• A logbook is an effective and simple medium for recording all facts
regarding incidents.
• Every step taken from the time the incident was detected to its final
resolution should be documented and time-stamped.
www.nadeshrk.webs.com
Importance of keeping records and evidence
relating to information security incidents
www.nadeshrk.webs.com