02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In <strong>the</strong> CSIRT community, we <strong>of</strong>ten say “Reuse, with appropriate attribution, is good.” Being<br />

able to learn from <strong>the</strong> actions and experiences <strong>of</strong> o<strong>the</strong>r response teams can be very effective<br />

in helping a team to develop <strong>the</strong>ir own plans. For example, in building a team for <strong>the</strong> German<br />

Research Network back in 1993, Kossakowski pointed out that <strong>the</strong>y were able to gain a lot <strong>of</strong><br />

knowledge about what <strong>the</strong>y needed to launch <strong>the</strong>ir CSIRT from talking to o<strong>the</strong>r teams [Kossakowski<br />

94b]. He also pointed out that it can be challenging to prepare a successful plan for<br />

a CSIRT, especially if starting from scratch. One <strong>of</strong> <strong>the</strong> lessons learned was that talking with<br />

o<strong>the</strong>r teams, reviewing information that is available on CSIRTs in general, and where possible<br />

and appropriate, visiting o<strong>the</strong>r CSIRTs, will go a long way towards helping you to build<br />

an effective plan for your own CSIRT [Kossakowski 94a].<br />

3.7.3 <strong>Incident</strong> Handling Process or Methodology<br />

As mentioned in <strong>the</strong> previous section, many authors provide a set <strong>of</strong> processes, steps, or<br />

methodologies that are recommended for handling incident activity, threats, and intruder attacks.<br />

Some teams have very formalized processes with flowcharts and checklists that team members<br />

must follow to handle an incident. O<strong>the</strong>r teams handle this process in a more ad hoc<br />

fashion. For example, <strong>the</strong> representation for <strong>the</strong> incident life cycle referenced in Section 3.4.1<br />

<strong>of</strong> <strong>the</strong> Handbook for CSIRTs shows a visual representation for how a report moves through<br />

<strong>the</strong> incident handling cycle [West-Brown 03].<br />

IDS<br />

O<strong>the</strong>r<br />

Email<br />

Triage<br />

Information<br />

Request<br />

Hotline/<br />

Phone<br />

Vulnerability<br />

Report<br />

Coordinate<br />

Information<br />

and<br />

<strong>Response</strong><br />

<strong>Incident</strong><br />

Report<br />

Initial Analysis and<br />

Data Collection<br />

Perform Technical<br />

Analysis<br />

Obtain<br />

Contact<br />

Information<br />

and<br />

Notify<br />

O<strong>the</strong>rs<br />

Figure 13: The <strong>Incident</strong> Life Cycle<br />

CMU/SEI-2003-TR-001 87

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!