02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

against what o<strong>the</strong>rs are doing. Appendix E contains copies <strong>of</strong> some incident reporting forms,<br />

which are included with <strong>the</strong> permission <strong>of</strong> <strong>the</strong> author or owner <strong>of</strong> <strong>the</strong> material.<br />

As we reviewed <strong>the</strong> literature, we found that <strong>the</strong>re are similarities in some <strong>of</strong> <strong>the</strong> forms and<br />

documents that have been developed. For example, as might be expected, <strong>the</strong> flowcharts illustrated<br />

in Mandia [Mandia 01, p. 18] and Nebraska [Nebraska 02] have many similar components,<br />

including pre-incident preparation, detection, and decision points for determining<br />

<strong>the</strong> next steps in <strong>the</strong> process (such as confirming an incident, formulating a response strategy,<br />

notifying and/or coordinating with contacts, documenting, and restoring operations). In addition,<br />

steps for investigative activities (forensics duplication, network monitoring, etc.) are<br />

steps included in <strong>the</strong> flow diagrams. O<strong>the</strong>r forms and documents contain similarities in <strong>the</strong><br />

type <strong>of</strong> information that is collected—what we refer to as <strong>the</strong> “critical information” that is<br />

needed regarding an event that has been reported to <strong>the</strong> CSIRT. This includes relevant contact<br />

information, hostnames, IP addresses, OS versions/patch levels, chronology documenting <strong>the</strong><br />

activity, and actions for response and follow up.<br />

In Section 3.7.2, “Having a Plan,” we referred to <strong>the</strong> fact that many <strong>of</strong> <strong>the</strong> documents we reviewed<br />

in <strong>the</strong> literature search included a variety <strong>of</strong> different incident response processes or<br />

steps. For example, <strong>the</strong>re are copies (or online versions <strong>of</strong>) incident reporting forms included<br />

in a number <strong>of</strong> publications [DHS 03, FCC 01, Kruse 02, Navy 96, Nebraska 02, SANS 03,<br />

USSS 01]. A variety <strong>of</strong> incident reporting and response flowcharts are referenced [Mandia 01,<br />

Kruse 02, Nebraska 02, Steele 02] and process guides or checklists available [Allen 01,<br />

Swanson 02, Vermont 01]. 148 Descriptions <strong>of</strong> an incident response process or methodology<br />

are included in several sources [Allen 01, SANS 03, Schultz 02, Symantec 01, West-Brown<br />

03]. More detailed guidance on response procedures 149 can be found in some [Allen 01, Mandia,<br />

01, SANS 03, Schiffman 01].<br />

148<br />

149<br />

While <strong>the</strong> CERT Guide to System and Network <strong>Security</strong> <strong>Practice</strong>s [Allen 01] and <strong>the</strong> NIST Contingency<br />

Planning Guide for Information Technology Systems [Swanson 02] are targeted at system<br />

and network administrators or o<strong>the</strong>r IT pr<strong>of</strong>essionals, <strong>the</strong> processes and practices are applicable in<br />

many areas <strong>of</strong> CSIRT work and may be worth reviewing.<br />

<strong>Response</strong> procedures are <strong>the</strong> specific steps recommended for protecting systems, detecting and<br />

responding to intrusions, and returning systems to normal operations.<br />

CMU/SEI-2003-TR-001 131

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!