02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ased on a sampling <strong>of</strong> CSIRTs done via survey; our own research, interviews, and observation<br />

6 ; and input and observations from o<strong>the</strong>rs in <strong>the</strong> field.<br />

This document provides information about CSIRTs at a particular point in time—June 2002<br />

through August 2003. Although some <strong>of</strong> <strong>the</strong> information is time constrained, <strong>the</strong> resulting<br />

information can still provide useful insights for organizations planning to create or expand an<br />

incident response capability or formal CSIRT.<br />

The focus <strong>of</strong> <strong>the</strong> document is <strong>the</strong> collection <strong>of</strong> data to understand how CSIRTs are structured<br />

and how <strong>the</strong>y operate and to determine if <strong>the</strong>re are any trends particular to a certain type <strong>of</strong><br />

CSIRT or CSIRT sector.<br />

This document does not try to make any recommendations for best practices or processes in<br />

day-to-day CSIRT activities. It is simply syn<strong>the</strong>sizing and presenting <strong>the</strong> information ga<strong>the</strong>red.<br />

This document also does not include a review or discussion <strong>of</strong> broader security standards<br />

such as those from <strong>the</strong> International Standards Organization (ISO) or British Standards (BS).<br />

1.3 Intended Audience<br />

The primary audience for this document includes <strong>the</strong> general CSIRT community who may<br />

want a better understanding <strong>of</strong> <strong>the</strong> structure and functions <strong>of</strong> existing teams. It will also benefit<br />

those individuals and organizations looking to join <strong>the</strong> CSIRT community. It is specifically<br />

targeted at those managers and individuals who are involved in <strong>the</strong> process <strong>of</strong> creating and<br />

operating a CSIRT or managing incident activity. This may include<br />

• Organizational Chief Information Officers (CIOs), Chief <strong>Security</strong> Officers (CSOs), and<br />

Information Systems <strong>Security</strong> Officers (ISSOs)<br />

• project leaders and members charged with creating a team<br />

• CSIRT managers<br />

• CSIRT staff<br />

• IT managers<br />

As well as being a useful reference for higher management levels and all CSIRT staff, this<br />

document can also be <strong>of</strong> use to o<strong>the</strong>r individuals who interact with CSIRTs and would benefit<br />

from an understanding <strong>of</strong> CSIRT organizational issues. This may include members <strong>of</strong> <strong>the</strong><br />

6<br />

All contributions were provided voluntarily.<br />

4 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!