02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Request Tracker. 97 JANET-CERT worked in collaboration with <strong>the</strong> s<strong>of</strong>tware vendor, who did<br />

<strong>the</strong> actual programming.<br />

DFN-CERT is also working on a project that has been funded by <strong>the</strong> German federal CSIRT,<br />

CERT-BUND, that involves researching requirements for a CSIRT incident tracking system.<br />

The prototype developed by DFN-CERT is based on RT and its extension for incident response,<br />

RTIR. The prototype is web-based and is called “Vorfallsbearbeitungssystem,” or<br />

VBS for short. The VBS extends RT/RTIR by adding specific workflows via roles and data<br />

fields specific to incident handling. 98<br />

Staff from both projects are collaborating and continue to work with <strong>the</strong> s<strong>of</strong>tware vendor to<br />

extend <strong>the</strong> requirements for an incident response specific tracking system. They are also<br />

looking for o<strong>the</strong>r teams who are interested in developing o<strong>the</strong>r extensions to this s<strong>of</strong>tware. 99<br />

Some o<strong>the</strong>r examples <strong>of</strong> incident tracking systems that are being developed and used for incident<br />

tracking within <strong>the</strong> CSIRT community include<br />

• <strong>the</strong> CERIAS <strong>Incident</strong> <strong>Response</strong> Database, which has specific fields for capturing incident<br />

costs 100<br />

• <strong>the</strong> University <strong>of</strong> Chicago Network <strong>Security</strong> Center (NSC) Freeman <strong>Incident</strong> Tracking<br />

System (FITS) 101<br />

3.7.6 Categorizing and Prioritizing <strong>Incident</strong> Reports<br />

There is no clear consensus on <strong>the</strong> best way to categorize and prioritize incident reports and<br />

activity. A variety <strong>of</strong> ways to identify and prioritize reports have been used by different organizations<br />

and discussed by various authors. A few <strong>of</strong> <strong>the</strong>se are summarized in Table 12.<br />

Table 12: Methods <strong>of</strong> Categorizing and Prioritizing <strong>Incident</strong> Reports and Activity<br />

Level/Priority<br />

Type <strong>of</strong> <strong>Incident</strong>/Activity<br />

[Kruse 02]<br />

Highest<br />

High<br />

Medium<br />

e-commerce, au<strong>the</strong>ntication/billing server, law enforcement subpoenas<br />

DNS/email/web server, router<br />

External attacks, successful internal attacks<br />

97<br />

98<br />

99<br />

100<br />

101<br />

Also from Best Practical S<strong>of</strong>tware, see .<br />

This information was provided by DFN-CERT.<br />

For more information about <strong>the</strong>se projects, contact JANET-CERT or DFN-CERT.<br />

For more information see .<br />

For more information, see .<br />

CMU/SEI-2003-TR-001 95

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!