02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Attempting to manage (or remember) <strong>the</strong> specific details for any one <strong>of</strong> <strong>the</strong>se incidents could<br />

be a challenge; when incidents involve hundreds (or thousands) <strong>of</strong> hosts or sites, remembering<br />

what happened, who was contacted, and <strong>the</strong> current status can be very difficult. Whatever<br />

techniques are used for recording and tracking CSIRT data, it is worthwhile to identify in <strong>the</strong><br />

requirements design that all data can be easily searched, incident reports can be handed <strong>of</strong>f to<br />

o<strong>the</strong>r staff members (e.g., reassign <strong>the</strong> responsibility for handling a specific report), and that<br />

current summaries <strong>of</strong> <strong>the</strong> workload and distribution across CSIRT staff can be determined.<br />

Ano<strong>the</strong>r consideration in determining what type <strong>of</strong> system to use for tracking and recording<br />

CSIRT data is whe<strong>the</strong>r it can effectively incorporate processes for capturing and storing data<br />

from o<strong>the</strong>r sources, such as telephone calls, facsimile, o<strong>the</strong>r types <strong>of</strong> correspondence, encrypted<br />

information, binary files, and o<strong>the</strong>r types <strong>of</strong> files.<br />

Some <strong>of</strong> <strong>the</strong> features that a CSIRT might require in recording and tracking data are included<br />

in Table 10.<br />

Table 10: Features <strong>of</strong> a CSIRT Tracking System<br />

Ability to: Support for: Fields to capture:<br />

• modify initial categorization<br />

<strong>of</strong> reports<br />

• access and read all related<br />

emails<br />

• respond to requests via email<br />

• assign actions and redistribute<br />

to o<strong>the</strong>rs as needed<br />

• search, sort, cross-reference,<br />

and correlate hosts, IP addresses,<br />

attack types, dates,<br />

and names<br />

• generate reports and/or statistics<br />

as required<br />

• review and/or reassign workload<br />

<strong>of</strong> an incident handler<br />

• open/close/reopen reports<br />

• access library <strong>of</strong> standard<br />

responses<br />

• trigger automatic reminders<br />

<strong>of</strong> incidents that need attention<br />

• standardized incident data<br />

representation (IODEF for<br />

example)<br />

• encrypting and decrypting<br />

data<br />

• documenting chain <strong>of</strong> custody<br />

as part <strong>of</strong> investigation<br />

or law enforcement activity<br />

• contact information<br />

• time zone for any times<br />

reported or logs sent<br />

• system information<br />

• resolution and mitigation<br />

strategies<br />

• recommended steps<br />

taken<br />

• staff interviewed during<br />

incident resolution<br />

• follow-up actions<br />

• cost <strong>of</strong> incident<br />

• amount <strong>of</strong> time to resolve<br />

(More fields are discussed<br />

in section 3.7.5.1)<br />

CMU/SEI-2003-TR-001 91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!