02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• 83% <strong>of</strong> <strong>the</strong> education CSIRTs share information with <strong>the</strong>ir CIO; 66% share information<br />

with business mangers, <strong>the</strong>ir IT and telecommunications department, and <strong>the</strong>ir legal department.<br />

• 75% <strong>of</strong> <strong>the</strong> information and communication CSIRTs share information with <strong>the</strong>ir CIO,<br />

o<strong>the</strong>r CSIRTs, and law enforcement.<br />

• 63% <strong>of</strong> military CSIRTs share information with o<strong>the</strong>r military organizations, <strong>the</strong>ir IT and<br />

telecommunications department, and <strong>the</strong>ir CIO.<br />

• 100% <strong>of</strong> o<strong>the</strong>r commercial CSIRTs share information with <strong>the</strong>ir CIO and with o<strong>the</strong>r<br />

CSIRTs.<br />

• 75% <strong>of</strong> <strong>the</strong> participating non-pr<strong>of</strong>it CSIRTs share information with law enforcement and<br />

o<strong>the</strong>r CSIRTs.<br />

Looking at this information by CSIRT model,<br />

• 100% <strong>of</strong> identified coordination centers share information with <strong>the</strong> CIO, law enforcement,<br />

and <strong>the</strong> IT and telecommunications departments.<br />

• 70% <strong>of</strong> <strong>the</strong> centralized CSIRTs share information with <strong>the</strong>ir CIO and IT and telecommunications<br />

departments; 80% share information with law enforcement.<br />

• 80% <strong>of</strong> <strong>the</strong> combined teams share information with o<strong>the</strong>r CSIRTs and law enforcement.<br />

• 100% <strong>of</strong> <strong>the</strong> distributed dedicated teams share information with <strong>the</strong> CIO; 75% share information<br />

with business managers, IT and telecommunications departments, and law enforcement.<br />

• 75% <strong>of</strong> distributed part-time teams share information with o<strong>the</strong>r CSIRTs and <strong>the</strong> IT and<br />

telecommunications departments; 50% share information with <strong>the</strong> CIO, business managers,<br />

and <strong>the</strong> human resources department.<br />

3.7.15 Documenting Policies and Procedures<br />

Documenting policies and procedures is one <strong>of</strong> <strong>the</strong> most important activities a CSIRT must<br />

undertake to be successful over <strong>the</strong> long term. Oppenheimer et al., in a booklet for system<br />

administrators published by SAGE, state that “security policies are among <strong>the</strong> most crucial<br />

elements <strong>of</strong> a security infrastructure.” They go on to discuss key elements to consider in <strong>the</strong><br />

policy design and implementation phase:<br />

• How specific should <strong>the</strong> policy be?<br />

• How much control should <strong>the</strong> policy enforce?<br />

• What is <strong>the</strong> appropriate security policy structure? [Oppenheimer 97]<br />

While <strong>the</strong>se questions relate to system administration and security policies, <strong>the</strong>y are still valid<br />

key elements in <strong>the</strong> design <strong>of</strong> policies and, modified slightly to focus on incident response<br />

issues, can apply equally well in <strong>the</strong> CSIRT environment.<br />

108 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!