02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4 Summary<br />

Our examination <strong>of</strong> <strong>the</strong> literature identified a few broad-based observations that will be <strong>of</strong><br />

interest to new and existing CSIRTs. This information can be used to fur<strong>the</strong>r increase <strong>the</strong>ir<br />

overall knowledge and understanding <strong>of</strong> incident handling, team responsibilities, team composition,<br />

techniques and procedures, and policy issues.<br />

• There is a growing base <strong>of</strong> anecdotal and case study information appearing in print about<br />

not only <strong>the</strong> formation and organization <strong>of</strong> CSIRTs, but also <strong>the</strong> general types <strong>of</strong> activities<br />

<strong>the</strong>se teams undertake and how <strong>the</strong>y perform <strong>the</strong>m.<br />

• More information is available about <strong>the</strong> management and costs related to building and<br />

operating incident response teams.<br />

• There are some common functional processes for performing incident handling activities<br />

in a CSIRT. Even if <strong>the</strong>se processes are grouped somewhat differently in <strong>the</strong> articles and<br />

publications discussed in this technical report, <strong>the</strong> basic processes revolve around <strong>the</strong> following<br />

tasks: prepare/protect, detect, respond, improve. See Section 3.7.7 for more detailed<br />

information.<br />

• There are many similarities in CSIRT processes; however, in <strong>the</strong> day-to-day operations <strong>of</strong><br />

a CSIRT, <strong>the</strong> way in which <strong>the</strong>se processes are implemented and <strong>the</strong> depth and breadth <strong>of</strong><br />

<strong>the</strong> services that are provided may be very different.<br />

Based on (a) our collective experience, (b) <strong>the</strong> reviewed literature, web sites, and CSIRT project<br />

information, and (c) <strong>the</strong> collected survey data, we see <strong>the</strong> current state <strong>of</strong> <strong>the</strong> practice for<br />

CSIRTs as follows:<br />

• All evidence points to a large growth in <strong>the</strong> number <strong>of</strong> incident response teams over <strong>the</strong><br />

past four to five years. This growth has primarily taken place in <strong>the</strong> commercial sector.<br />

Growth in education and government teams has also continued. O<strong>the</strong>rs seeking to create<br />

CSIRTs include organizations in critical infrastructures such as <strong>the</strong> finance/banking and<br />

power/energy sectors. Globally we are seeing more interest in implementing CSIRTs, especially<br />

national and local government teams.:<br />

• The reasons for <strong>the</strong> growth in teams include (a) <strong>the</strong> increase in <strong>the</strong> number <strong>of</strong> security<br />

incidents and <strong>the</strong> recognition <strong>of</strong> a need for a planned response, (b) new legal requirements,<br />

and (c) <strong>the</strong> current view that computer security must be proactive to be successful;<br />

being reactive is no longer sufficient.<br />

• <strong>Incident</strong> handling and incident response teams are still relatively new areas in computer<br />

security, and incident response is still an immature field. Because <strong>of</strong> this <strong>the</strong>re are few<br />

CMU/SEI-2003-TR-001 133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!