02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ole. This may include providing security awareness training, security consulting, configuration<br />

maintenance, and producing technical documents and advisories. 11<br />

A majority <strong>of</strong> CSIRTs started as “response-oriented” organizations, but have since developed<br />

into organizations that work proactively to defend and protect <strong>the</strong> critical assets <strong>of</strong> organizations<br />

and <strong>the</strong> Internet community in general. This proactive work can also include influencing<br />

policy, and coordinating workshops and information exchanges. It also includes analyzing<br />

intruder trends and patterns to create a better understanding <strong>of</strong> <strong>the</strong> changing environment so<br />

that corresponding prevention, mitigation, and response strategies can be developed and disseminated.<br />

When utilized to its fullest extent, however, a CSIRT is more than an incident response capability.<br />

The goals <strong>of</strong> a CSIRT must be based on <strong>the</strong> business goals <strong>of</strong> <strong>the</strong> constituent or parent<br />

organizations. Protecting critical assets is key to <strong>the</strong> success <strong>of</strong> both an organization and its<br />

CSIRT. The goal <strong>of</strong> a CSIRT, in this context, is to minimize and control <strong>the</strong> damage, provide<br />

effective response and recovery, and work to prevent future events from happening. In this<br />

role <strong>the</strong> CSIRT collects incident information, security weaknesses, and s<strong>of</strong>tware and system<br />

vulnerabilities in <strong>the</strong> organizational infrastructure or within a constituency.<br />

In a commercial, military, educational, or government setting, <strong>the</strong> CSIRT becomes a focal<br />

point for business intelligence within <strong>the</strong> organization and a primary source <strong>of</strong> au<strong>the</strong>ntic risk<br />

data. This information can provide an important data feed into operational risk modeling. The<br />

CSIRT can be seen as a key element in loss minimization and risk mitigation. In this same<br />

manner, <strong>the</strong> CSIRT’s role as a central repository allows it to ga<strong>the</strong>r an enterprise-wide picture<br />

<strong>of</strong> security issues as it relates across <strong>the</strong> organization. This also allows <strong>the</strong> CSIRT to link toge<strong>the</strong>r<br />

events that may not have been seen to be related when looked at individually.<br />

A CSIRT can be on-site and able to conduct a rapid response to contain a computer security<br />

incident and recover from it. CSIRTs may also have familiarity with <strong>the</strong> compromised systems<br />

and <strong>the</strong>refore be more readily able to coordinate <strong>the</strong> recovery and propose mitigation<br />

and response strategies. Their relationships with o<strong>the</strong>r CSIRTs and security organizations can<br />

facilitate <strong>the</strong> sharing <strong>of</strong> response strategies and early alerts to potential problems.<br />

CSIRTs can work with o<strong>the</strong>r areas <strong>of</strong> <strong>the</strong> organization to ensure new systems are developed<br />

and deployed with security in mind and in conformance with any site security policies. They<br />

can help identify vulnerable areas <strong>of</strong> <strong>the</strong> organization and in some cases perform vulnerability<br />

assessments and incident detection services. In <strong>the</strong>ir coordination function, <strong>the</strong>y can be a central<br />

point that pulls toge<strong>the</strong>r information and analysis from <strong>the</strong> physical security sector, <strong>the</strong> IT<br />

11<br />

For a description <strong>of</strong> <strong>the</strong>se various services see <strong>the</strong> CSIRT Services list at<br />

.<br />

12 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!