02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Rule #1: Don’t Panic!<br />

• Rule #2: Document! [Garfinkel 91]<br />

There are myriad reasons to track and record information:<br />

• maintaining an archive <strong>of</strong> <strong>the</strong> types <strong>of</strong> incidents a CSIRT handles over <strong>the</strong> course <strong>of</strong> a<br />

year<br />

• identifying and compiling trends and statistics<br />

• keeping detailed information that will be admissible in a court <strong>of</strong> law (should criminal<br />

investigation <strong>of</strong> an incident be pursued)<br />

• managing incident workload across staff<br />

• providing reports on <strong>the</strong> status <strong>of</strong> an incident or incident report<br />

• identifying work tasks that must be completed for an incident<br />

• handing over an incident to ano<strong>the</strong>r staff member for completion<br />

• identifying large-scale incidents that might not be apparent when reviewing individual<br />

incident reports<br />

• correlating incident activity across <strong>the</strong> enterprise<br />

Depending on <strong>the</strong> mission and goals <strong>of</strong> a team, <strong>the</strong>se reasons will vary; however, <strong>the</strong>re are<br />

some common bits <strong>of</strong> data that will be useful to collect no matter what <strong>the</strong> end goal.<br />

Each CSIRT needs to decide what data should be recorded and tracked. This will help to ensure<br />

that <strong>the</strong> team is providing effective response services, is meeting any management and<br />

funding requirements, and may also help to determine needed staffing levels.<br />

Many teams recommend starting a log immediately to begin capturing critical information<br />

about a reported activity. Keeping accurate information about <strong>the</strong> date and time, what has<br />

occurred, who has been contacted, and what actions have been taken or need to be taken all<br />

need to be included in such a chronological log [Mandia 01, p. 31]. This is most important<br />

during times when incident activity is increasing and team members are handling multiple<br />

events or incidents. In <strong>the</strong> early 1990s, for example, it was not uncommon for <strong>the</strong> CERT/CC<br />

incident handling staff to be managing anywhere from 20-25 “active” open incidents concurrently.<br />

This collection <strong>of</strong> assigned incidents could include activity such as<br />

• newly received reports<br />

• on-going interactions with previously reported incidents<br />

• contacting/interacting with o<strong>the</strong>r identified sites related to previously reported incidents<br />

• closed incidents that had been reopened because additional activity reports were received<br />

• o<strong>the</strong>r types <strong>of</strong> requests for information<br />

90 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!