16.04.2014 Views

vPLfv

vPLfv

vPLfv

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In developing this model, we strived to ensure that our work complemented and conformed<br />

to other work going on in the CSIRT community and that it fit into a broader enterprise security<br />

framework. 7 For example, we wanted to ensure that our work was also applicable to the<br />

Department of Defense (DoD) Computer Network Defense Service Provider (CNDSP) certification<br />

and accreditation metrics.<br />

The U.S. Department of Defense established a directive and instruction whereby all DoD<br />

components are required to establish and provide for computer network defense services. 8<br />

The CNDS is built around a framework of functional capabilities that are often provided by a<br />

CSIRT. Those CND services are defined as: Protect; Monitor, Analyze & Detect; and Respond.<br />

The primary goal of the DoD CNDSP certification and accreditation (C&A) process is<br />

to enhance the survivability of DoD information systems and computer networks through a<br />

standardized evaluation process. A secondary goal is to ensure a higher quality of protection<br />

through increased maturity and understanding of the services provided by the CNDSP. The<br />

DoD’s evaluation process is used as a measurement of mission effectiveness, operational performance,<br />

and functional maturity through a number of critical success factors.<br />

The functional model that we are presenting in this publication does not match process name<br />

to process name with the CNDSP metrics, but all the processes and functions outlined in the<br />

CNDS metrics do match to a process area within our incident management process workflows.<br />

9<br />

1.5 Purpose of this Report<br />

This report documents the initial work done to date to define incident management processes.<br />

It is a first step in providing the framework for creating and operating incident management<br />

capabilities, including CSIRTs. As such it can be used as a foundational publication and reference<br />

to detail a best practice model for incident management processes.<br />

One of the main purposes of the report is to outline the basic concepts and methodology behind<br />

the use of process mapping for defining incident management processes. Another purpose<br />

is to define the Prepare, Protect, Detect, Triage, and Respond processes at a detailed<br />

level in process workflows and corresponding descriptions and handoffs. The report also<br />

looks at the relationship CSIRTs have to the overall incident management functions, hence<br />

the name, Defining Incident Management Processes for CSIRTs. You will find that the majority<br />

of the details of the processes in the workflows and descriptions are from the CSIRT point<br />

of view.<br />

7<br />

8<br />

9<br />

Work is currently ongoing within the SEI’s Networked Systems Survivability program to develop<br />

a framework for Enterprise Security Management (ESM). For more information on the evolving<br />

ESM work, see: http://www.cert.org/nav/index_green.html.<br />

As outlined in DoD Directive O-8530.1, “Computer Network Defense,” and DoD Instruction O-<br />

8530.2, “Support to Computer Network Defense.”<br />

The areas covered by the CNDSP C&A metrics are: Protection; Detection; Response; and CND<br />

Sustainment Functions.<br />

CMU/SEI-2004-TR-015 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!