02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Level/Priority<br />

Devilish<br />

Type <strong>of</strong> <strong>Incident</strong>/Activity<br />

Attacks indicate domain expertise; extremely skilled, innovative, able to<br />

cover tracks, can leave covert re-entry channels; difficult to catch by average<br />

system and network administrator<br />

[McGlashan 01]<br />

Priority 1<br />

Priority 2<br />

Priority 3<br />

Priority 4<br />

Priority 5<br />

Preservation <strong>of</strong> non-critical systems<br />

Continuity <strong>of</strong> complete service<br />

Preservation <strong>of</strong> critical systems, proprietary* strategic information<br />

Classified or (legally) sensitive data<br />

Life and health<br />

For an interesting comparison, here are <strong>the</strong> hurricane severity levels developed by <strong>the</strong> National<br />

Hurricane Preparedness Center: 102<br />

Table 13: Severity Levels <strong>of</strong> <strong>the</strong> National Hurricane Preparedness Center<br />

Level<br />

CAT 1<br />

CAT 2<br />

CAT 3<br />

CAT 4<br />

CAT 5<br />

Description<br />

Winds <strong>of</strong> 74 to 95 miles per hour<br />

Winds <strong>of</strong> 96 to 110 miles per hour<br />

Winds <strong>of</strong> 111 to 130 miles per hour<br />

Winds <strong>of</strong> 131 to 155 miles per hour<br />

Winds greater than 155 miles per hour<br />

Some o<strong>the</strong>r levels include<br />

• AusCERT – Priority 1-5 (lowest is non-critical systems; highest equals life and death)<br />

[AusCERT 01]<br />

• The ISS paper on “<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong> Planning,” discusses levels <strong>of</strong><br />

severity from 1-5 (severity 1 being a low-impact incident and 5 being “significant)” 103<br />

Most authors believe that something as simple as establishing or assigning rankings such as<br />

Category 1, 2, or 3 or High, Medium, or Low will assist in prioritizing incident reports. Over<br />

time <strong>the</strong>se may need to be expanded to meet <strong>the</strong> requirements or needs <strong>of</strong> <strong>the</strong> CSIRT and<br />

constituency being served. At one <strong>of</strong> our CSIRT development courses, one attendee discussed<br />

<strong>the</strong>ir categories for intruder activity and response. They used colors as indicators for <strong>the</strong> level<br />

<strong>of</strong> “threat” associated with an incident or o<strong>the</strong>r activity being handled by <strong>the</strong> team: red (high<br />

102<br />

103<br />

<br />

Internet <strong>Security</strong> Systems. “<strong>Computer</strong> <strong>Security</strong> <strong>Incident</strong> <strong>Response</strong> Planning, Preparing for <strong>the</strong><br />

Inevitable.” Atlanta, GA, 2001.<br />

CMU/SEI-2003-TR-001 97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!