02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

survey. Ten percent required a bachelor’s degree, 6% required <strong>the</strong> CISSP certification, 6%<br />

required Micros<strong>of</strong>t Certified Systems Administrator (MCSA) 89 certifications, and 3% required<br />

GIAC GCIH certification.<br />

Along with external training, many teams have <strong>the</strong>ir own internal training to teach CSIRT<br />

staff <strong>the</strong> specifics <strong>of</strong> <strong>the</strong>ir particular services. Fifty-five percent <strong>of</strong> <strong>the</strong> participating CSIRTs<br />

stated that <strong>the</strong>y had a formal training program for <strong>the</strong> CSIRT staff.<br />

Appendix C lists some current sources for CSIRT training. In addition to <strong>the</strong> URLs listed in<br />

this appendix, a search on <strong>the</strong> World Wide Web can provide an ever-growing menu <strong>of</strong> o<strong>the</strong>r<br />

sites and organizations that now <strong>of</strong>fer some level <strong>of</strong> incident handling training. In assessing<br />

any training providers, it is important to try to determine whe<strong>the</strong>r <strong>the</strong> type <strong>of</strong> training being<br />

<strong>of</strong>fered meets <strong>the</strong> needs <strong>of</strong> <strong>the</strong> team and individual members <strong>of</strong> <strong>the</strong> team.<br />

3.7 Processes<br />

In this section we look at how CSIRTs go about receiving, categorizing, tracking, and responding<br />

to computer security incidents. Information was ga<strong>the</strong>red through <strong>the</strong> CSIRT Organizational<br />

Survey, literature search, our own experiences, and discussions with o<strong>the</strong>r teams.<br />

We will begin with a look at <strong>the</strong> definition <strong>of</strong> computer security incidents and o<strong>the</strong>r incident<br />

response terminology. Next we will look at what is involved in creating an incident response<br />

plan. We will move on from <strong>the</strong>re to discuss various CSIRT operational processes such as<br />

• receiving incident data<br />

• recording and tracking CSIRT data<br />

• categorizing and prioritizing incident reports<br />

• performing incident response<br />

• answering <strong>the</strong> hotline<br />

• performing forensic analysis<br />

• coordinating and sharing information<br />

We will also discuss defining <strong>the</strong> hours <strong>of</strong> operation.<br />

89<br />

<br />

CMU/SEI-2003-TR-001 81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!