16.04.2014 Views

vPLfv

vPLfv

vPLfv

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

agement activities. Often the only way to combat malicious activity is to prevent its initial<br />

entry into an enterprise. As a result of lessons learned during an incident, organizations often<br />

have to make organizational and technical changes to their infrastructure to prevent attacks<br />

from successfully happening again. Other proactive protection activities, such as vulnerability<br />

scanning, penetration testing, network monitoring, public monitoring, and risk evaluation<br />

or assessment, relate directly to methods of detecting and reporting events, incidents, vulnerabilities,<br />

and other computer security related information. Protecting an organization’s infrastructure<br />

becomes a strategy for not only preventing attacks but also for identifying, containing,<br />

and stopping malicious activity in a timely manner. The infrastructure defenses are one<br />

type of tool used to manage incident activity. Because of this multilevel connection between<br />

the protection of an organization’s infrastructure and the resolution of incidents, we believe<br />

that the Protect function must be included as one of the activities in the broader scope of incident<br />

management.<br />

One other process that we include and that is also mentioned by ISS [ISS 01] as being an important<br />

part of the incident management process is Triage. Some people see triage as being<br />

the first step in response (the Respond process), a method for performing an initial analysis of<br />

a report to determine what has happened and what the impact is, while also categorizing and<br />

prioritizing an event or incident. We have set Triage as a process separate from Respond, due<br />

to the fact that how triage is performed will depend heavily on who performs it. Triage can be<br />

handled in multiple ways. It can be done by an incident handler as part of the initial analysis<br />

of an event; it can be done by a help desk that handles general computer problems for an organization;<br />

it can be outsourced to a managed security service provider; or it can be handled<br />

by specific positions in an organization, such as an information security officer. When handled<br />

outside of a CSIRT, there are risks to the transfer of information from the triage role to<br />

the incident handling role that can occur. Triage is also important as a location where categorization<br />

and correlation of events can occur. As such, it is on the critical path to response and<br />

should be accorded an appropriate set of resources. For these many reasons, we believe Triage<br />

should stand alone as a process.<br />

Depending on the type, structure, and mission of an incident management capability, some of<br />

these processes may not apply. For example, a coordinating CSIRT might not perform any<br />

type of Protect or even Detect functions. Various types of incident management capabilities<br />

may actually only focus on one part of these processes. In future reports, we hope to address<br />

some of these different types of capabilities and how their process workflows differ from the<br />

ones described here.<br />

2.4 Incident Management Versus Security<br />

Management<br />

Precisely defining incident management is difficult; the words mean different things to different<br />

communities. For example, in the Information Technology Infrastructure Library<br />

(ITIL), a best practice series of books providing guidance on developing and implementing<br />

CMU/SEI-2004-TR-015 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!