02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• identifying <strong>the</strong> staff and necessary expertise and training required<br />

• identifying and defining <strong>the</strong> proactive and reactive services to be provided by <strong>the</strong> team<br />

• providing guidance for reporting and handling incident reports<br />

• providing security awareness and incident response training for CSIRT staff and constituency<br />

• establishing and encouraging well-defined incident handling and security policies and<br />

procedures for <strong>the</strong> CSIRT and for <strong>the</strong> constituency<br />

• sharing lessons learned with o<strong>the</strong>rs<br />

• establishing a method for evaluating how effective <strong>the</strong> CSIRT has been<br />

• establishing a method for coordination between <strong>the</strong> CSIRT and internal and external parties<br />

All <strong>of</strong> <strong>the</strong>se issues and areas define <strong>the</strong> basic framework <strong>of</strong> <strong>the</strong> CSIRT.<br />

In addition, many <strong>of</strong> <strong>the</strong>se authors provide a set <strong>of</strong> processes or steps that are used in incident<br />

response activities. Selections <strong>of</strong> <strong>the</strong>se processes from several authors are highlighted in Appendix<br />

B. Each process is outlined from each <strong>of</strong> <strong>the</strong> books or articles reviewed.<br />

In reviewing <strong>the</strong> materials in <strong>the</strong> appendix, it can be seen that <strong>the</strong> basic steps for incident<br />

management and response are very similar across <strong>the</strong> authors. They basically break down<br />

into some form <strong>of</strong><br />

• prepare/protect<br />

• detect<br />

• contain<br />

• analyze<br />

• respond<br />

• improve<br />

The “prepare” or “protect” functions refer to proactive mechanisms to have in place to effectively<br />

respond to an incident. This includes having incident reporting guidelines available to<br />

<strong>the</strong> constituency and defined incident handling procedures for CSIRT staff. It also involves<br />

<strong>the</strong> implementation <strong>of</strong> security best practices to protect systems. These best practices can include<br />

applying appropriate security configurations for s<strong>of</strong>tware and hardware; keeping up to<br />

date with patches and operating system upgrades; monitoring system and network activity;<br />

disabling unneeded services; enabling maximum auditing; installing internal and external<br />

defenses such as firewalls, routers, and intrusion detection systems; and raising user awareness<br />

regarding computer security issues.<br />

86 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!